首页 > 最新文献

International Journal of Intelligent Systems最新文献

英文 中文
Neural Networks With Linear Adaptive Batch Normalization and Swarm Intelligence Calibration for Real-Time Gaze Estimation on Smartphones 采用线性自适应批量归一化和群集智能校准的神经网络用于智能手机的实时注视估计
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-21 DOI: 10.1155/2024/2644725
Gancheng Zhu, Yongkai Li, Shuai Zhang, Xiaoting Duan, Zehao Huang, Zhaomin Yao, Rong Wang, Zhiguo Wang

Eye tracking has emerged as a valuable tool for both research and clinical applications. However, traditional eye-tracking systems are often bulky and expensive, limiting their widespread adoption in various fields. Smartphone eye tracking has become feasible with advanced deep learning and edge computing technologies. However, the field still faces practical challenges related to large-scale datasets, model inference speed, and gaze estimation accuracy. The present study created a new dataset that contains over 3.2 million face images collected with recent phone models and presents a comprehensive smartphone eye-tracking pipeline comprising a deep neural network framework (MGazeNet), a personalized model calibration method, and a heuristic gaze signal filter. The MGazeNet model introduced a linear adaptive batch normalization module to efficiently combine eye and face features, achieving the state-of-the-art gaze estimation accuracy of 1.59 cm on the GazeCapture dataset and 1.48 cm on our custom dataset. In addition, an algorithm that utilizes multiverse optimization to optimize the hyperparameters of support vector regression (MVO–SVR) was proposed to improve eye-tracking calibration accuracy with 13 or fewer ground-truth gaze points, further improving gaze estimation accuracy to 0.89 cm. This integrated approach allows for eye tracking with accuracy comparable to that of research-grade eye trackers, offering new application possibilities for smartphone eye tracking.

眼动跟踪已成为研究和临床应用的重要工具。然而,传统的眼动追踪系统往往体积庞大、价格昂贵,限制了其在各个领域的广泛应用。借助先进的深度学习和边缘计算技术,智能手机眼动追踪变得可行。然而,该领域仍然面临着与大规模数据集、模型推理速度和注视估计精度有关的实际挑战。本研究创建了一个新的数据集,其中包含用最新手机模型收集的超过 320 万张人脸图像,并提出了一个全面的智能手机眼球跟踪管道,包括一个深度神经网络框架(MGazeNet)、一个个性化模型校准方法和一个启发式凝视信号滤波器。MGazeNet模型引入了线性自适应批量归一化模块,有效地结合了眼部和面部特征,在GazeCapture数据集上实现了1.59厘米的最先进注视估计精度,在我们的自定义数据集上实现了1.48厘米的最先进注视估计精度。此外,我们还提出了一种利用多元宇宙优化来优化支持向量回归超参数(MVO-SVR)的算法,以提高 13 个或更少的地面真实注视点的眼球跟踪校准精度,从而将注视估计精度进一步提高到 0.89 厘米。这种综合方法使眼球跟踪的精确度可与研究级眼球跟踪仪相媲美,为智能手机眼球跟踪提供了新的应用可能性。
{"title":"Neural Networks With Linear Adaptive Batch Normalization and Swarm Intelligence Calibration for Real-Time Gaze Estimation on Smartphones","authors":"Gancheng Zhu,&nbsp;Yongkai Li,&nbsp;Shuai Zhang,&nbsp;Xiaoting Duan,&nbsp;Zehao Huang,&nbsp;Zhaomin Yao,&nbsp;Rong Wang,&nbsp;Zhiguo Wang","doi":"10.1155/2024/2644725","DOIUrl":"https://doi.org/10.1155/2024/2644725","url":null,"abstract":"<div>\u0000 <p>Eye tracking has emerged as a valuable tool for both research and clinical applications. However, traditional eye-tracking systems are often bulky and expensive, limiting their widespread adoption in various fields. Smartphone eye tracking has become feasible with advanced deep learning and edge computing technologies. However, the field still faces practical challenges related to large-scale datasets, model inference speed, and gaze estimation accuracy. The present study created a new dataset that contains over 3.2 million face images collected with recent phone models and presents a comprehensive smartphone eye-tracking pipeline comprising a deep neural network framework (MGazeNet), a personalized model calibration method, and a heuristic gaze signal filter. The MGazeNet model introduced a linear adaptive batch normalization module to efficiently combine eye and face features, achieving the state-of-the-art gaze estimation accuracy of 1.59 cm on the GazeCapture dataset and 1.48 cm on our custom dataset. In addition, an algorithm that utilizes multiverse optimization to optimize the hyperparameters of support vector regression (MVO–SVR) was proposed to improve eye-tracking calibration accuracy with 13 or fewer ground-truth gaze points, further improving gaze estimation accuracy to 0.89 cm. This integrated approach allows for eye tracking with accuracy comparable to that of research-grade eye trackers, offering new application possibilities for smartphone eye tracking.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/2644725","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142708140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Power Control and Resource Allocation With Task Offloading for Collaborative Device-Edge-Cloud Computing Systems 针对协作式设备边缘云计算系统的任务卸载联合功率控制与资源分配
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-20 DOI: 10.1155/2024/6852701
Shumin Xie, Kangshun Li, Wenxiang Wang, Hui Wang, Hassan Jalil

Collaborative edge and cloud computing is a promising computing paradigm for reducing the task response delay and energy consumption of devices. In this paper, we aim to jointly optimize task offloading strategy, power control for devices, and resource allocation for edge servers within a collaborative device-edge-cloud computing system. We formulate this problem as a constrained multiobjective optimization problem and propose a joint optimization algorithm (JO-DEC) based on a multiobjective evolutionary algorithm to solve it. To address the tight coupling of the variables and the high-dimensional decision space, we propose a decoupling encoding strategy (DES) and a boundary point sampling strategy (BPS) to improve the performance of the algorithm. The DES is utilized to decouple the correlations among decision variables, and BPS is employed to enhance the convergence speed and population diversity of the algorithm. Simulation results demonstrate that JO-DEC outperforms three state-of-the-art algorithms in terms of convergence and diversity, enabling it to achieve a smaller task response delay and lower energy consumption.

协同边缘和云计算是一种很有前途的计算模式,可以减少设备的任务响应延迟和能耗。本文旨在联合优化设备-边缘-云计算协作系统中的任务卸载策略、设备功率控制和边缘服务器的资源分配。我们将该问题表述为一个约束多目标优化问题,并提出了一种基于多目标进化算法的联合优化算法(JO-DEC)来解决该问题。为了解决变量和高维决策空间的紧密耦合问题,我们提出了解耦编码策略(DES)和边界点采样策略(BPS),以提高算法的性能。DES 用于解耦决策变量之间的相关性,BPS 用于提高算法的收敛速度和群体多样性。仿真结果表明,JO-DEC 在收敛性和多样性方面优于三种最先进的算法,使其能够实现更小的任务响应延迟和更低的能耗。
{"title":"Joint Power Control and Resource Allocation With Task Offloading for Collaborative Device-Edge-Cloud Computing Systems","authors":"Shumin Xie,&nbsp;Kangshun Li,&nbsp;Wenxiang Wang,&nbsp;Hui Wang,&nbsp;Hassan Jalil","doi":"10.1155/2024/6852701","DOIUrl":"https://doi.org/10.1155/2024/6852701","url":null,"abstract":"<div>\u0000 <p>Collaborative edge and cloud computing is a promising computing paradigm for reducing the task response delay and energy consumption of devices. In this paper, we aim to jointly optimize task offloading strategy, power control for devices, and resource allocation for edge servers within a collaborative device-edge-cloud computing system. We formulate this problem as a constrained multiobjective optimization problem and propose a joint optimization algorithm (JO-DEC) based on a multiobjective evolutionary algorithm to solve it. To address the tight coupling of the variables and the high-dimensional decision space, we propose a decoupling encoding strategy (DES) and a boundary point sampling strategy (BPS) to improve the performance of the algorithm. The DES is utilized to decouple the correlations among decision variables, and BPS is employed to enhance the convergence speed and population diversity of the algorithm. Simulation results demonstrate that JO-DEC outperforms three state-of-the-art algorithms in terms of convergence and diversity, enabling it to achieve a smaller task response delay and lower energy consumption.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/6852701","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of Large Language Models on API Misuse Programming Repair 关于 API 滥用编程修复的大型语言模型的安全分析
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-19 DOI: 10.1155/2024/7135765
Rui Zhang, Ziyue Qiao, Yong Yu

Application programming interface (API) misuse refers to misconceptions or carelessness in the anticipated usage of APIs, threatening the software system’s security. Moreover, API misuses demonstrate significant concealment and are challenging to uncover. Recent advancements have explored enhanced LLMs in a variety of software engineering (SE) activities, such as code repair. Nonetheless, the security implications of using LLMs for these purposes remain underexplored, particularly concerning the issue of API misuse. In this paper, we present an empirical study to observe the bug-fixing capabilities of LLMs in addressing API misuse related to monitoring resource management (MRM API misuse). Initially, we propose APImisRepair, a real-world benchmark for repairing MRM API misuse, including buggy programs, corresponding fixed programs, and descriptions of API misuse. Subsequently, we assess the performance of several LLMs using the APImisRepair benchmark. Findings reveal the vulnerabilities of LLMs in repairing MRM API misuse and find several reasons, encompassing factors such as fault localization and a lack of awareness regarding API misuse. Additionally, we have insights on improving LLMs in terms of their ability to fix MRM API misuse and introduce a crafted approach, APImisAP. Experimental results demonstrate that APImisAP exhibits a certain degree of improvement in the security of LLMs.

应用程序接口(API)滥用是指在预期使用 API 时出现误解或疏忽,从而威胁到软件系统的安全。此外,应用程序接口误用具有很大的隐蔽性,揭露起来也很困难。最近的进展是在代码修复等各种软件工程(SE)活动中探索增强型 LLM。然而,将 LLMs 用于这些目的的安全影响仍未得到充分探索,尤其是在 API 滥用问题上。在本文中,我们介绍了一项实证研究,以观察 LLM 在解决与监控资源管理相关的 API 滥用(MRM API 滥用)方面的错误修复能力。首先,我们提出了 APImisRepair,这是一个用于修复 MRM API 滥用的真实世界基准,其中包括错误程序、相应的修复程序以及 API 滥用的描述。随后,我们使用 APImisRepair 基准评估了几种 LLM 的性能。研究结果揭示了 LLM 在修复 MRM API 误用方面的漏洞,并发现了若干原因,其中包括故障定位和缺乏对 API 误用的认识等因素。此外,我们还就如何提高 LLM 修复 MRM API 误用的能力提出了见解,并介绍了一种精心设计的方法 APImisAP。实验结果表明,APImisAP 在一定程度上提高了 LLM 的安全性。
{"title":"Security Analysis of Large Language Models on API Misuse Programming Repair","authors":"Rui Zhang,&nbsp;Ziyue Qiao,&nbsp;Yong Yu","doi":"10.1155/2024/7135765","DOIUrl":"https://doi.org/10.1155/2024/7135765","url":null,"abstract":"<div>\u0000 <p>Application programming interface (API) misuse refers to misconceptions or carelessness in the anticipated usage of APIs, threatening the software system’s security. Moreover, API misuses demonstrate significant concealment and are challenging to uncover. Recent advancements have explored enhanced LLMs in a variety of software engineering (SE) activities, such as code repair. Nonetheless, the security implications of using LLMs for these purposes remain underexplored, particularly concerning the issue of API misuse. In this paper, we present an empirical study to observe the bug-fixing capabilities of LLMs in addressing API misuse related to monitoring resource management (MRM API misuse). Initially, we propose APImisRepair, a real-world benchmark for repairing MRM API misuse, including buggy programs, corresponding fixed programs, and descriptions of API misuse. Subsequently, we assess the performance of several LLMs using the APImisRepair benchmark. Findings reveal the vulnerabilities of LLMs in repairing MRM API misuse and find several reasons, encompassing factors such as fault localization and a lack of awareness regarding API misuse. Additionally, we have insights on improving LLMs in terms of their ability to fix MRM API misuse and introduce a crafted approach, APImisAP. Experimental results demonstrate that APImisAP exhibits a certain degree of improvement in the security of LLMs.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/7135765","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure and Fair Client Selection Based on DDPG for Federated Learning 基于 DDPG 的安全公平客户端选择用于联合学习
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-19 DOI: 10.1155/2024/2314019
Tao Wan, Shun Feng, Weichuan Liao, Nan Jiang, Jie Zhou

Federated learning (FL) is a machine learning technique in which a large number of clients collaborate to train models without sharing private data. However, FL’s integrity is vulnerable to unreliable models; for instance, data poisoning attacks can compromise the system. In addition, system preferences and resource disparities preclude fair participation by reliable clients. To address this challenge, we propose a novel client selection strategy that introduces a security-fairness value to measure client performance in FL. The value in question is a composite metric that combines a security score and a fairness score. The former is dynamically calculated from a beta distribution reflecting past performance, while the latter considers the client’s participation frequency in the aggregation process. The weighting strategy based on the deep deterministic policy gradient (DDPG) determines these scores. Experimental results confirm that our method fairly effectively selects reliable clients and maintains the security and fairness of the FL system.

联合学习(FL)是一种机器学习技术,在这种技术中,大量客户端在不共享私人数据的情况下合作训练模型。然而,FL 的完整性容易受到不可靠模型的影响;例如,数据中毒攻击会破坏系统。此外,系统偏好和资源差异也阻碍了可靠客户端的公平参与。为了应对这一挑战,我们提出了一种新颖的客户机选择策略,该策略引入了一个安全-公平值来衡量 FL 中客户机的性能。该值是一个综合指标,结合了安全性得分和公平性得分。前者由反映过往性能的贝塔分布动态计算得出,后者则考虑了客户在聚合过程中的参与频率。基于深度确定性策略梯度(DDPG)的加权策略决定了这些分数。实验结果证实,我们的方法能相当有效地选择可靠的客户端,并保持 FL 系统的安全性和公平性。
{"title":"A Secure and Fair Client Selection Based on DDPG for Federated Learning","authors":"Tao Wan,&nbsp;Shun Feng,&nbsp;Weichuan Liao,&nbsp;Nan Jiang,&nbsp;Jie Zhou","doi":"10.1155/2024/2314019","DOIUrl":"https://doi.org/10.1155/2024/2314019","url":null,"abstract":"<div>\u0000 <p>Federated learning (FL) is a machine learning technique in which a large number of clients collaborate to train models without sharing private data. However, FL’s integrity is vulnerable to unreliable models; for instance, data poisoning attacks can compromise the system. In addition, system preferences and resource disparities preclude fair participation by reliable clients. To address this challenge, we propose a novel client selection strategy that introduces a security-fairness value to measure client performance in FL. The value in question is a composite metric that combines a security score and a fairness score. The former is dynamically calculated from a beta distribution reflecting past performance, while the latter considers the client’s participation frequency in the aggregation process. The weighting strategy based on the deep deterministic policy gradient (DDPG) determines these scores. Experimental results confirm that our method fairly effectively selects reliable clients and maintains the security and fairness of the FL system.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/2314019","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
K-Means Centroids Initialization Based on Differentiation Between Instances Attributes 基于实例属性差异的 K-Means 中心点初始化
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-18 DOI: 10.1155/2024/7086878
Ali Akbar Khan, Muhammad Salman Bashir, Asma Batool, Muhammad Summair Raza, Muhammad Adnan Bashir

The conventional K-Means clustering algorithm is widely used for grouping similar data points by initially selecting random centroids. However, the accuracy of clustering results is significantly influenced by the initial centroid selection. Despite different approaches, including various K-Means versions, suboptimal outcomes persist due to inadequate initial centroid choices and reliance on common normalization techniques like min-max normalization. In this study, we propose an improved algorithm that selects initial centroids more effectively by utilizing a novel formula to differentiate between instance attributes, creating a single weight for differentiation. We introduce a preprocessing phase for dataset normalization without forcing values into a specific range, yielding significantly improved results compared to unnormalized datasets and those normalized using min-max techniques. For our experiments, we used five real datasets and five simulated datasets. The proposed algorithm is evaluated using various metrics and an external benchmark measure, such as the Adjusted Rand Index (ARI), and compared with the traditional K-Means algorithm and 11 other modified K-Means algorithms. Experimental evaluations on these datasets demonstrate the superiority of our proposed methodologies, achieving an impressive average accuracy rate of up to 95.47% and an average ARI score of 0.95. Additionally, the number of iterations required is reduced compared to the conventional K-Means algorithm. By introducing innovative techniques, this research provides significant contributions to the field of data clustering, particularly in addressing modern data-driven clustering challenges.

传统的 K-Means 聚类算法被广泛用于通过初始随机选择中心点对相似数据点进行分组。然而,聚类结果的准确性在很大程度上受到初始中心点选择的影响。尽管有不同的方法,包括各种 K-Means 版本,但由于初始中心点选择不当,以及依赖于最小最大归一化等常见归一化技术,次优结果依然存在。在本研究中,我们提出了一种改进的算法,通过利用新颖的公式来区分实例属性,创建用于区分的单一权重,从而更有效地选择初始中心点。我们引入了数据集归一化的预处理阶段,无需将数值强制纳入特定范围,与未归一化的数据集和使用最小最大技术归一化的数据集相比,结果有了显著改善。在实验中,我们使用了五个真实数据集和五个模拟数据集。我们使用各种指标和外部基准指标(如调整后兰德指数(ARI))对所提出的算法进行了评估,并与传统的 K-Means 算法和其他 11 种改进的 K-Means 算法进行了比较。在这些数据集上进行的实验评估证明了我们提出的方法的优越性,平均准确率高达 95.47%,平均 ARI 得分为 0.95。此外,与传统的 K-Means 算法相比,所需的迭代次数也有所减少。通过引入创新技术,这项研究为数据聚类领域做出了重大贡献,尤其是在应对现代数据驱动的聚类挑战方面。
{"title":"K-Means Centroids Initialization Based on Differentiation Between Instances Attributes","authors":"Ali Akbar Khan,&nbsp;Muhammad Salman Bashir,&nbsp;Asma Batool,&nbsp;Muhammad Summair Raza,&nbsp;Muhammad Adnan Bashir","doi":"10.1155/2024/7086878","DOIUrl":"https://doi.org/10.1155/2024/7086878","url":null,"abstract":"<div>\u0000 <p>The conventional K-Means clustering algorithm is widely used for grouping similar data points by initially selecting random centroids. However, the accuracy of clustering results is significantly influenced by the initial centroid selection. Despite different approaches, including various K-Means versions, suboptimal outcomes persist due to inadequate initial centroid choices and reliance on common normalization techniques like min-max normalization. In this study, we propose an improved algorithm that selects initial centroids more effectively by utilizing a novel formula to differentiate between instance attributes, creating a single weight for differentiation. We introduce a preprocessing phase for dataset normalization without forcing values into a specific range, yielding significantly improved results compared to unnormalized datasets and those normalized using min-max techniques. For our experiments, we used five real datasets and five simulated datasets. The proposed algorithm is evaluated using various metrics and an external benchmark measure, such as the Adjusted Rand Index (ARI), and compared with the traditional K-Means algorithm and 11 other modified K-Means algorithms. Experimental evaluations on these datasets demonstrate the superiority of our proposed methodologies, achieving an impressive average accuracy rate of up to 95.47% and an average ARI score of 0.95. Additionally, the number of iterations required is reduced compared to the conventional K-Means algorithm. By introducing innovative techniques, this research provides significant contributions to the field of data clustering, particularly in addressing modern data-driven clustering challenges.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/7086878","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142666133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ViT-AMD: A New Deep Learning Model for Age-Related Macular Degeneration Diagnosis From Fundus Images ViT-AMD:从眼底图像诊断年龄相关性黄斑变性的新型深度学习模型
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-15 DOI: 10.1155/2024/3026500
Ngoc Thien Le, Thanh Le Truong, Sunchai Deelertpaiboon, Wattanasak Srisiri, Pear Ferreira Pongsachareonnont, Disorn Suwajanakorn, Apivat Mavichak, Rath Itthipanichpong, Widhyakorn Asdornwised, Watit Benjapolakul, Surachai Chaitusaney, Pasu Kaewplung

Age-related macular degeneration (AMD) diagnosis using fundus images is one of the critical missions of the eye-care screening program in many countries. Various proposed deep learning models have been studied for this research interest, which aim to achieve the mission and outperform human-based approaches. However, research efforts are still required for the improvement of model classification accuracy, sensitivity, and specificity values. In this study, we proposed the model named as ViT-AMD, which is based on the latest Vision Transformer (ViT) structure, to diagnosis a fundus image as normal, dry AMD, or wet AMD types. Unlike convolution neural network models, ViT consists of the attention map layers, which show more effective performance for image classification task. Our training process is based on the 5-fold cross-validation and transfer learning techniques using Chula-AMD dataset at the Department of Ophthalmology, the King Chulalongkorn Memorial Hospital, Bangkok. Furthermore, we also test the performance of trained model using an independent image datasets. The results showed that for the 3-classes AMD classification (normal vs. dry AMD vs. wet AMD) on the Chula-AMD dataset, the averaged accuracy, precision, sensitivity, and specificity of our trained model are about 93.40%, 92.15%, 91.27%, and 96.57%, respectively. For result testing on independent datasets, the averaged accuracy, precision, sensitivity, and specificity of trained model are about 74, 20%, 75.35%, 74.13%, and 87.07%, respectively. Compared with the results from the baseline CNN-based model (DenseNet201), the trained ViT-AMD model has outperformed significantly. In conclusion, the ViT-AMD model have proved their usefulness to assist the ophthalmologist to diagnosis the AMD disease.

利用眼底图像诊断老年性黄斑变性(AMD)是许多国家眼科筛查项目的重要任务之一。针对这一研究兴趣,人们研究了各种拟议的深度学习模型,旨在实现这一任务并超越基于人类的方法。然而,要提高模型的分类准确性、灵敏度和特异性值,仍需努力研究。在本研究中,我们提出了基于最新视觉转换器(ViT)结构的 ViT-AMD 模型,以诊断眼底图像为正常、干性 AMD 或湿性 AMD 类型。与卷积神经网络模型不同,ViT 由注意力图层组成,在图像分类任务中表现出更有效的性能。我们利用曼谷朱拉隆功国王纪念医院眼科部的 Chula-AMD 数据集,采用 5 倍交叉验证和迁移学习技术进行训练。此外,我们还使用独立的图像数据集测试了训练模型的性能。结果显示,对于 Chula-AMD 数据集上的三类 AMD 分类(正常 AMD vs. 干性 AMD vs. 湿性 AMD),我们训练模型的平均准确率、精确度、灵敏度和特异性分别约为 93.40%、92.15%、91.27% 和 96.57%。在独立数据集的结果测试中,训练模型的平均准确率、精确度、灵敏度和特异性分别约为 74%、20%、75.35%、74.13% 和 87.07%。与基于 CNN 的基线模型(DenseNet201)的结果相比,训练后的 ViT-AMD 模型有明显的优越性。总之,ViT-AMD 模型证明了其在协助眼科医生诊断 AMD 疾病方面的实用性。
{"title":"ViT-AMD: A New Deep Learning Model for Age-Related Macular Degeneration Diagnosis From Fundus Images","authors":"Ngoc Thien Le,&nbsp;Thanh Le Truong,&nbsp;Sunchai Deelertpaiboon,&nbsp;Wattanasak Srisiri,&nbsp;Pear Ferreira Pongsachareonnont,&nbsp;Disorn Suwajanakorn,&nbsp;Apivat Mavichak,&nbsp;Rath Itthipanichpong,&nbsp;Widhyakorn Asdornwised,&nbsp;Watit Benjapolakul,&nbsp;Surachai Chaitusaney,&nbsp;Pasu Kaewplung","doi":"10.1155/2024/3026500","DOIUrl":"https://doi.org/10.1155/2024/3026500","url":null,"abstract":"<div>\u0000 <p>Age-related macular degeneration (AMD) diagnosis using fundus images is one of the critical missions of the eye-care screening program in many countries. Various proposed deep learning models have been studied for this research interest, which aim to achieve the mission and outperform human-based approaches. However, research efforts are still required for the improvement of model classification accuracy, sensitivity, and specificity values. In this study, we proposed the model named as ViT-AMD, which is based on the latest Vision Transformer (ViT) structure, to diagnosis a fundus image as normal, dry AMD, or wet AMD types. Unlike convolution neural network models, ViT consists of the attention map layers, which show more effective performance for image classification task. Our training process is based on the 5-fold cross-validation and transfer learning techniques using Chula-AMD dataset at the Department of Ophthalmology, the King Chulalongkorn Memorial Hospital, Bangkok. Furthermore, we also test the performance of trained model using an independent image datasets. The results showed that for the 3-classes AMD classification (normal vs. dry AMD vs. wet AMD) on the Chula-AMD dataset, the averaged accuracy, precision, sensitivity, and specificity of our trained model are about 93.40%, 92.15%, 91.27%, and 96.57%, respectively. For result testing on independent datasets, the averaged accuracy, precision, sensitivity, and specificity of trained model are about 74, 20%, 75.35%, 74.13%, and 87.07%, respectively. Compared with the results from the baseline CNN-based model (DenseNet201), the trained ViT-AMD model has outperformed significantly. In conclusion, the ViT-AMD model have proved their usefulness to assist the ophthalmologist to diagnosis the AMD disease.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/3026500","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142664876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Switched Observer-Based Event-Triggered Safety Control for Delayed Networked Control Systems Under Aperiodic Cyber attacks 非周期性网络攻击下基于开关观测器的延迟网络控制系统事件触发安全控制
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-14 DOI: 10.1155/2024/6971338
Shuqi Li, Yiren Chen, Wenli Shang, Feiqi Deng, Xiaobin Gao

The networked control systems (NCSs) under cyberattacks have received much attention in both industrial and academic fields, with rare attention on the delayed networked control systems (DNCSs). In order to well address the control problem of DNCSs, in this study, we consider the resilient event-triggered safety control problem of the NCSs with time-varying delays based on the switched observer subject to aperiodic denial-of-service (DoS) attacks. The observer-based switched event-triggered control (ETC) strategy is devised to cope with the DNCSs under aperiodic cyberattacks for the first time so as to decrease the transmission of control input under limited network channel resources. A new piecewise Lyapunov functional is proposed to analyze and synthesize the DNCSs with exponential stability. The quantitative relationship among the attack activated/sleeping period, exponential decay rate, event-triggered parameters, sampling period, and maximum time-delay are explored. Finally, we use both a numerical example and a practical example of offshore platform to show the effectiveness of our results.

网络攻击下的网络化控制系统(NCS)在工业和学术领域都受到了广泛关注,而对延迟网络化控制系统(DNCS)的关注却很少。为了很好地解决 DNCS 的控制问题,在本研究中,我们考虑了在非周期性拒绝服务(DoS)攻击下,基于交换式观测器的具有时变延迟的 NCS 的弹性事件触发安全控制问题。本文首次提出了基于观测器的交换式事件触发控制(ETC)策略,以应对非周期性网络攻击下的 DNCS,从而在有限的网络信道资源下减少控制输入的传输。提出了一种新的片式 Lyapunov 函数来分析和合成具有指数稳定性的 DNCS。探讨了攻击激活/休眠期、指数衰减率、事件触发参数、采样周期和最大时延之间的定量关系。最后,我们用一个数值示例和一个离岸平台的实际示例来说明我们的成果的有效性。
{"title":"Switched Observer-Based Event-Triggered Safety Control for Delayed Networked Control Systems Under Aperiodic Cyber attacks","authors":"Shuqi Li,&nbsp;Yiren Chen,&nbsp;Wenli Shang,&nbsp;Feiqi Deng,&nbsp;Xiaobin Gao","doi":"10.1155/2024/6971338","DOIUrl":"https://doi.org/10.1155/2024/6971338","url":null,"abstract":"<div>\u0000 <p>The networked control systems (NCSs) under cyberattacks have received much attention in both industrial and academic fields, with rare attention on the delayed networked control systems (DNCSs). In order to well address the control problem of DNCSs, in this study, we consider the resilient event-triggered safety control problem of the NCSs with time-varying delays based on the switched observer subject to aperiodic denial-of-service (DoS) attacks. The observer-based switched event-triggered control (ETC) strategy is devised to cope with the DNCSs under aperiodic cyberattacks for the first time so as to decrease the transmission of control input under limited network channel resources. A new piecewise Lyapunov functional is proposed to analyze and synthesize the DNCSs with exponential stability. The quantitative relationship among the attack activated/sleeping period, exponential decay rate, event-triggered parameters, sampling period, and maximum time-delay are explored. Finally, we use both a numerical example and a practical example of offshore platform to show the effectiveness of our results.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/6971338","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142664736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Innovative Application of Swarm-Based Algorithms for Peer Clustering 基于蜂群算法的同伴聚类创新应用
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-12 DOI: 10.1155/2024/5571499
Vesna Šešum-Čavić, Eva Kühn, Laura Toifl

In most peer-to-peer (P2P) networks, peers are placed randomly or based on their geographical position, which can lead to a performance bottleneck. This problem can be solved by using peer clustering algorithms. In this paper, the significant results of the paper can be described in the following sentences. We propose two innovative swarm-based metaheuristics for peer clustering, slime mold and slime mold K-means. They are competitively benchmarked, evaluated, and compared to nine well-known conventional and swarm-based algorithms: artificial bee colony (ABC), ABC combined with K-means, ant-based clustering, ant K-means, fuzzy C-means, genetic K-means, hierarchical clustering, K-means, and particle swarm optimization (PSO). The benchmarks cover parameter sensitivity analysis and comparative analysis made by using 5 different metrics: execution time, Davies–Bouldin index (DBI), Dunn index (DI), silhouette coefficient (SC), and averaged dissimilarity coefficient (ADC). Furthermore, a statistical analysis is performed in order to validate the obtained results. Slime mold and slime mold K-means outperform all other swarm-inspired algorithms in terms of execution time and quality of the clustering solution.

在大多数点对点(P2P)网络中,点对点是随机或根据地理位置放置的,这可能会导致性能瓶颈。使用对等聚类算法可以解决这一问题。本文的重要成果可以用以下几句话来描述。我们提出了两种创新的基于蜂群的同行聚类元启发式算法--黏菌和黏菌 K-均值。我们对它们进行了基准测试、评估,并与九种著名的传统算法和基于蜂群的算法进行了比较:人工蜂群(ABC)、ABC 与 K-means相结合、基于蚂蚁的聚类、蚂蚁 K-means、模糊 C-means、遗传 K-means、分层聚类、K-means 和粒子群优化(PSO)。这些基准包括参数敏感性分析和使用 5 种不同指标进行的比较分析:执行时间、戴维斯-博尔丁指数(DBI)、邓恩指数(DI)、剪影系数(SC)和平均相似系数(ADC)。此外,还进行了统计分析,以验证所获得的结果。就执行时间和聚类解决方案的质量而言,粘菌和粘菌 K-means 算法优于所有其他蜂群启发算法。
{"title":"An Innovative Application of Swarm-Based Algorithms for Peer Clustering","authors":"Vesna Šešum-Čavić,&nbsp;Eva Kühn,&nbsp;Laura Toifl","doi":"10.1155/2024/5571499","DOIUrl":"https://doi.org/10.1155/2024/5571499","url":null,"abstract":"<div>\u0000 <p>In most peer-to-peer (P2P) networks, peers are placed randomly or based on their geographical position, which can lead to a performance bottleneck. This problem can be solved by using peer clustering algorithms. In this paper, the significant results of the paper can be described in the following sentences. We propose two innovative swarm-based metaheuristics for peer clustering, slime mold and slime mold K-means. They are competitively benchmarked, evaluated, and compared to nine well-known conventional and swarm-based algorithms: artificial bee colony (ABC), ABC combined with K-means, ant-based clustering, ant K-means, fuzzy C-means, genetic K-means, hierarchical clustering, K-means, and particle swarm optimization (PSO). The benchmarks cover parameter sensitivity analysis and comparative analysis made by using 5 different metrics: execution time, Davies–Bouldin index (DBI), Dunn index (DI), silhouette coefficient (SC), and averaged dissimilarity coefficient (ADC). Furthermore, a statistical analysis is performed in order to validate the obtained results. Slime mold and slime mold K-means outperform all other swarm-inspired algorithms in terms of execution time and quality of the clustering solution.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/5571499","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142664793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deepfake Detection Based on the Adaptive Fusion of Spatial-Frequency Features 基于空间-频率特性自适应融合的深度伪造检测
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-07 DOI: 10.1155/2024/7578036
Fei Wang, Qile Chen, Botao Jing, Yeling Tang, Zengren Song, Bo Wang

Detecting deepfake media remains an ongoing challenge, particularly as forgery techniques rapidly evolve and become increasingly diverse. Existing face forgery detection models typically attempt to discriminate fake images by identifying either spatial artifacts (e.g., generative distortions and blending inconsistencies) or predominantly frequency-based artifacts (e.g., GAN fingerprints). However, a singular focus on a single type of forgery cue can lead to limited model performance. In this work, we propose a novel cross-domain approach that leverages a combination of both spatial and frequency-aware cues to enhance deepfake detection. First, we extract wavelet features using wavelet transformation and residual features using a specialized frequency domain filter. These complementary feature representations are then concatenated to obtain a composite frequency domain feature set. Furthermore, we introduce an adaptive feature fusion module that integrates the RGB color features of the image with the composite frequency domain features, resulting in a rich, multifaceted set of classification features. Extensive experiments conducted on benchmark deepfake detection datasets demonstrate the effectiveness of our method. Notably, the accuracy of our method on the challenging FF++ dataset is mostly above 98%, showcasing its strong performance in reliably identifying deepfake images across diverse forgery techniques.

深度伪造媒体的检测仍然是一项持续的挑战,尤其是随着伪造技术的快速发展和日益多样化。现有的人脸伪造检测模型通常试图通过识别空间伪影(如生成扭曲和混合不一致)或主要基于频率的伪影(如 GAN 指纹)来辨别伪造图像。然而,只关注单一类型的伪造线索可能会导致模型性能有限。在这项工作中,我们提出了一种新颖的跨领域方法,利用空间和频率感知线索的组合来增强深度伪造检测。首先,我们利用小波变换提取小波特征,并利用专门的频域滤波器提取残差特征。然后将这些互补的特征表征串联起来,得到一个复合频域特征集。此外,我们还引入了一个自适应特征融合模块,将图像的 RGB 颜色特征与复合频域特征整合在一起,从而得到一组丰富、多层面的分类特征。在基准深度伪造检测数据集上进行的大量实验证明了我们方法的有效性。值得注意的是,我们的方法在具有挑战性的 FF++ 数据集上的准确率大多在 98% 以上,展示了它在可靠识别各种伪造技术的深度伪造图像方面的强大性能。
{"title":"Deepfake Detection Based on the Adaptive Fusion of Spatial-Frequency Features","authors":"Fei Wang,&nbsp;Qile Chen,&nbsp;Botao Jing,&nbsp;Yeling Tang,&nbsp;Zengren Song,&nbsp;Bo Wang","doi":"10.1155/2024/7578036","DOIUrl":"https://doi.org/10.1155/2024/7578036","url":null,"abstract":"<div>\u0000 <p>Detecting deepfake media remains an ongoing challenge, particularly as forgery techniques rapidly evolve and become increasingly diverse. Existing face forgery detection models typically attempt to discriminate fake images by identifying either spatial artifacts (e.g., generative distortions and blending inconsistencies) or predominantly frequency-based artifacts (e.g., GAN fingerprints). However, a singular focus on a single type of forgery cue can lead to limited model performance. In this work, we propose a novel cross-domain approach that leverages a combination of both spatial and frequency-aware cues to enhance deepfake detection. First, we extract wavelet features using wavelet transformation and residual features using a specialized frequency domain filter. These complementary feature representations are then concatenated to obtain a composite frequency domain feature set. Furthermore, we introduce an adaptive feature fusion module that integrates the RGB color features of the image with the composite frequency domain features, resulting in a rich, multifaceted set of classification features. Extensive experiments conducted on benchmark deepfake detection datasets demonstrate the effectiveness of our method. Notably, the accuracy of our method on the challenging FF++ dataset is mostly above 98%, showcasing its strong performance in reliably identifying deepfake images across diverse forgery techniques.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/7578036","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142664498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of the Information Dissemination Model and Calculation of User Influence Based on Attenuation Coefficient 根据衰减系数构建信息传播模型并计算用户影响力
IF 5 2区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-11-04 DOI: 10.1155/2024/2103945
Lin Guo, Su Zhang, Xiaoying Liu

Users’ online activities serve as a mirror, reflecting their unique personas, affiliations, interests, and hobbies within the real world. Network information dissemination is inherently targeted, as users actively seek information to facilitate precise and swift communication. Delving into the nuances of information propagation on the Internet holds immense potential for facilitating commercial endeavors such as targeted advertising, personalized product recommendations, and insightful consumer behavior analyses. Recognizing that the intensity of information transmission diminishes with the proliferation of competing messages, increased transmission distances, and the passage of time, this paper draws inspiration from the concept of heat attenuation to formulate an innovative information propagation model. This model simulates the “heat index” of each node in the transmission process, thereby capturing the dynamic nature of information flow. Extensive experiments, bolstered by comparative analyses of multiple datasets and relevant algorithms, validate the correctness, feasibility, and efficiency of our proposed algorithm. Notably, our approach demonstrates remarkable accuracy and stability, underscoring its potential for real-world applications.

用户的网上活动就像一面镜子,反映了他们在现实世界中的独特角色、从属关系、兴趣和爱好。网络信息传播本质上是有针对性的,因为用户会主动寻找信息,以促进精确而迅速的交流。深入研究互联网信息传播的细微差别,对于促进商业活动(如有针对性的广告、个性化产品推荐和有洞察力的消费者行为分析)具有巨大的潜力。本文认识到信息传播的强度会随着竞争信息的激增、传输距离的增加和时间的流逝而减弱,因此从热衰减的概念中汲取灵感,制定了一个创新的信息传播模型。该模型模拟了传输过程中每个节点的 "热指数",从而捕捉到信息流的动态本质。通过对多个数据集和相关算法的对比分析,大量的实验验证了我们提出的算法的正确性、可行性和效率。值得注意的是,我们的方法表现出了显著的准确性和稳定性,突出了其在现实世界中的应用潜力。
{"title":"Construction of the Information Dissemination Model and Calculation of User Influence Based on Attenuation Coefficient","authors":"Lin Guo,&nbsp;Su Zhang,&nbsp;Xiaoying Liu","doi":"10.1155/2024/2103945","DOIUrl":"https://doi.org/10.1155/2024/2103945","url":null,"abstract":"<div>\u0000 <p>Users’ online activities serve as a mirror, reflecting their unique personas, affiliations, interests, and hobbies within the real world. Network information dissemination is inherently targeted, as users actively seek information to facilitate precise and swift communication. Delving into the nuances of information propagation on the Internet holds immense potential for facilitating commercial endeavors such as targeted advertising, personalized product recommendations, and insightful consumer behavior analyses. Recognizing that the intensity of information transmission diminishes with the proliferation of competing messages, increased transmission distances, and the passage of time, this paper draws inspiration from the concept of heat attenuation to formulate an innovative information propagation model. This model simulates the “heat index” of each node in the transmission process, thereby capturing the dynamic nature of information flow. Extensive experiments, bolstered by comparative analyses of multiple datasets and relevant algorithms, validate the correctness, feasibility, and efficiency of our proposed algorithm. Notably, our approach demonstrates remarkable accuracy and stability, underscoring its potential for real-world applications.</p>\u0000 </div>","PeriodicalId":14089,"journal":{"name":"International Journal of Intelligent Systems","volume":"2024 1","pages":""},"PeriodicalIF":5.0,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1155/2024/2103945","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142588198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Intelligent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1