首页 > 最新文献

2023 International Conference on Networking and Communications (ICNWC)最新文献

英文 中文
Contextual learning in Video Analytics for Human pose Detection using Bayesian Learning and LSTM 使用贝叶斯学习和LSTM进行人体姿态检测的视频分析中的上下文学习
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127440
S. Jeevidha, S. Saraswathi, D. Vishnuprasad.
With the increase in the number of crimes in the city, we are in need of a Smart surveillance camera that detects anomalies in advance. In real-world object detection identity switching and object interactions are difficult and retain identities. Due to a lack of situational awareness real-time object detection and tracking lack semantic information. Surveillance cameras are installed everywhere, and we can’t identify peoples who might be a potential threat to security, Surveillance camera needs to be monitored all the time. Existing algorithm concentrate on feature aggregation at the pixel level. A novel method is proposed to track human different movements and positions encompassing deep and detailed features. The main goal of this paper is to propose a feature aggregation at a semantic level that will prevent threats in advance by introducing a deep learning technique with Contextual inference-based object detection using the Bayesian Rule which incorporates semantic relations between classes to recognize the location. It also integrates the relationship between the object in unseen classes which helps to identify located instances and predicts the location and extracts context features for superclass prediction.
随着城市犯罪数量的增加,我们需要一种能够提前发现异常情况的智能监控摄像头。在现实世界的目标检测中,身份转换和对象交互是困难的,并且会保留身份。由于缺乏态势感知,实时目标检测和跟踪缺乏语义信息。监控摄像头无处不在,我们无法识别可能对安全构成潜在威胁的人,监控摄像头需要一直被监控。现有算法主要集中在像素级的特征聚合。提出了一种包含深度和细节特征的人体不同运动和位置跟踪方法。本文的主要目标是在语义层面提出一种特征聚合,通过引入基于上下文推理的对象检测的深度学习技术,该技术使用贝叶斯规则结合类之间的语义关系来识别位置,从而提前预防威胁。它还集成了不可见类中对象之间的关系,这有助于识别定位实例和预测位置,并提取上下文特征用于超类预测。
{"title":"Contextual learning in Video Analytics for Human pose Detection using Bayesian Learning and LSTM","authors":"S. Jeevidha, S. Saraswathi, D. Vishnuprasad.","doi":"10.1109/ICNWC57852.2023.10127440","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127440","url":null,"abstract":"With the increase in the number of crimes in the city, we are in need of a Smart surveillance camera that detects anomalies in advance. In real-world object detection identity switching and object interactions are difficult and retain identities. Due to a lack of situational awareness real-time object detection and tracking lack semantic information. Surveillance cameras are installed everywhere, and we can’t identify peoples who might be a potential threat to security, Surveillance camera needs to be monitored all the time. Existing algorithm concentrate on feature aggregation at the pixel level. A novel method is proposed to track human different movements and positions encompassing deep and detailed features. The main goal of this paper is to propose a feature aggregation at a semantic level that will prevent threats in advance by introducing a deep learning technique with Contextual inference-based object detection using the Bayesian Rule which incorporates semantic relations between classes to recognize the location. It also integrates the relationship between the object in unseen classes which helps to identify located instances and predicts the location and extracts context features for superclass prediction.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116304121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Remote Monitoring as a Service (MaaS) for Solar Power Plant 太阳能电站安全远程监控即服务(MaaS)
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127495
C. Priya, J. Thangakumar, M. Sambath
In the field of Renewable energy, data processing is occurring in the photovoltaic plant using the IoT data logger. A data logger is a piece of technology that records and stores data over time, where SCADA systems are also indulged in data transfer and monitoring. Using these systems, we are transferring data from the data logger to cloud where a cloud-based platform is allowed users to manage and monitors the data loggers and as the result of analysis of various plants, the issues will be reported in the ticketing system and the further storage will be done in another cloud. This will result a cloud-cloud data flow where we are concentrating in ensuring the security of the data logger, Ethernet, WIFI, router connectivity, external web pages where data is viewed should be protected and the data backup, storage should be a secured area. RS485/RS422 bus provides the highest data transmission rate in data logger. Data encryption technique that involves Internet-cloud data transfers. This project mainly focus on introducing some new technologies in MaaS, where MaaS is a collection of tools and apps used to monitor a specific aspect of an application, server, system, or IT component. In the solar industry, this implies combining hardware, software, and services to monitor, evaluate, and troubleshoot solar plant faults throughout the solar array’s lifetime, where we can monitor the amount of energy and control it securely. And this will help to introduce a secure wide range of global monitoring and reporting techniques in the renewable energy sector where data and data loggers are rising along with the risks. Cyber threats have a significant impact on smart grid performance due to the fast proliferation of real system in power electronic systems for connecting renewable energy sources with cyber frameworks. These electrical equipment in systems are linked by communication networks, which may be vulnerable to major cyber-attacks by malicious attackers. We have shown the development of solid mitigation and response strategies in the proposed system.
在可再生能源领域,光伏电站使用物联网数据记录器进行数据处理。数据记录器是一种记录和存储数据的技术,SCADA系统也沉迷于数据传输和监控。使用这些系统,我们将数据从数据记录仪传输到云,云平台允许用户管理和监控数据记录仪,作为对各种工厂的分析结果,问题将在票务系统中报告,进一步的存储将在另一个云上完成。这将导致云-云数据流,我们将集中精力确保数据记录器、以太网、WIFI、路由器连接的安全性,查看数据的外部网页应该受到保护,数据备份、存储应该是一个安全的区域。RS485/RS422总线在数据记录仪中提供最高的数据传输速率。涉及互联网-云数据传输的数据加密技术。该项目主要关注在MaaS中引入一些新技术,其中MaaS是用于监控应用程序、服务器、系统或IT组件的特定方面的工具和应用程序的集合。在太阳能行业中,这意味着将硬件、软件和服务结合起来,在太阳能电池阵的整个生命周期内监测、评估和排除太阳能发电厂的故障,这样我们就可以监测能量的数量并安全地控制它。这将有助于在可再生能源领域引入安全的广泛的全球监测和报告技术,在这个领域,数据和数据记录器随着风险的增加而增加。由于将可再生能源与网络框架连接起来的电力电子系统中真实系统的快速扩散,网络威胁对智能电网的性能产生了重大影响。系统中的这些电气设备通过通信网络连接,这可能容易受到恶意攻击者的主要网络攻击。我们已经展示了在拟议系统中固体缓解和响应策略的发展。
{"title":"A Secure Remote Monitoring as a Service (MaaS) for Solar Power Plant","authors":"C. Priya, J. Thangakumar, M. Sambath","doi":"10.1109/ICNWC57852.2023.10127495","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127495","url":null,"abstract":"In the field of Renewable energy, data processing is occurring in the photovoltaic plant using the IoT data logger. A data logger is a piece of technology that records and stores data over time, where SCADA systems are also indulged in data transfer and monitoring. Using these systems, we are transferring data from the data logger to cloud where a cloud-based platform is allowed users to manage and monitors the data loggers and as the result of analysis of various plants, the issues will be reported in the ticketing system and the further storage will be done in another cloud. This will result a cloud-cloud data flow where we are concentrating in ensuring the security of the data logger, Ethernet, WIFI, router connectivity, external web pages where data is viewed should be protected and the data backup, storage should be a secured area. RS485/RS422 bus provides the highest data transmission rate in data logger. Data encryption technique that involves Internet-cloud data transfers. This project mainly focus on introducing some new technologies in MaaS, where MaaS is a collection of tools and apps used to monitor a specific aspect of an application, server, system, or IT component. In the solar industry, this implies combining hardware, software, and services to monitor, evaluate, and troubleshoot solar plant faults throughout the solar array’s lifetime, where we can monitor the amount of energy and control it securely. And this will help to introduce a secure wide range of global monitoring and reporting techniques in the renewable energy sector where data and data loggers are rising along with the risks. Cyber threats have a significant impact on smart grid performance due to the fast proliferation of real system in power electronic systems for connecting renewable energy sources with cyber frameworks. These electrical equipment in systems are linked by communication networks, which may be vulnerable to major cyber-attacks by malicious attackers. We have shown the development of solid mitigation and response strategies in the proposed system.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securely Transmit Data Over Long Distances Using Quantum Key Distribution Based On E91 Protocol 利用基于E91协议的量子密钥分配实现数据的长距离安全传输
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127429
RajKumar V, P. G
At its core, quantum computing is a fastdeveloping technology that has the potential to process massive volumes of data at high speeds. Some factoring issues may be difficult for the classical computer to solve because of the nature of the factoring. Quantum computing data connections are carried out using optical fiber at a distance as short as possible. While using the E91 protocol for quantum key distribution in a wireless network communication channel, we may extend the distance over which keys are sent. How to design a wireless communication channel for use in quantum computing applications. Using this technology, we are now investigating the development of a broadcast channel that will enhance the data transmission range while maintaining high security and minimizing time consumption. In our technique, we employed polarization multiplexing to communicate across a broadcast channel satellite connection, which allowed us to share data between the transmitter and receiver at the same time. The transfer key is protected by the use of polarization multiplexing and the E91 protocol, both of which are implemented. In a security network, it is used to create an extended communication channel distance between two nodes. In the end, we can meet our goal in this study by comparing the existing method to the performance analysis shown in a graph.
从本质上讲,量子计算是一项快速发展的技术,具有高速处理大量数据的潜力。由于因式分解的性质,一些因式分解问题可能难以用经典计算机解决。量子计算数据连接使用光纤在尽可能短的距离上进行。在无线网络通信信道中使用E91协议进行量子密钥分发时,可以延长密钥发送的距离。如何设计用于量子计算应用的无线通信信道。利用这项技术,我们正在研究开发一种广播频道,该频道将在保持高安全性和最小化时间消耗的同时增强数据传输范围。在我们的技术中,我们采用极化多路复用技术通过广播频道卫星连接进行通信,这使我们能够同时在发射器和接收器之间共享数据。使用偏振复用和E91协议对传输密钥进行保护,并实现了这两种协议。在安全网络中,它用于在两个节点之间创建一个扩展的通信通道距离。最后,通过将现有的方法与图表所示的性能分析方法进行比较,我们可以达到本研究的目标。
{"title":"Securely Transmit Data Over Long Distances Using Quantum Key Distribution Based On E91 Protocol","authors":"RajKumar V, P. G","doi":"10.1109/ICNWC57852.2023.10127429","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127429","url":null,"abstract":"At its core, quantum computing is a fastdeveloping technology that has the potential to process massive volumes of data at high speeds. Some factoring issues may be difficult for the classical computer to solve because of the nature of the factoring. Quantum computing data connections are carried out using optical fiber at a distance as short as possible. While using the E91 protocol for quantum key distribution in a wireless network communication channel, we may extend the distance over which keys are sent. How to design a wireless communication channel for use in quantum computing applications. Using this technology, we are now investigating the development of a broadcast channel that will enhance the data transmission range while maintaining high security and minimizing time consumption. In our technique, we employed polarization multiplexing to communicate across a broadcast channel satellite connection, which allowed us to share data between the transmitter and receiver at the same time. The transfer key is protected by the use of polarization multiplexing and the E91 protocol, both of which are implemented. In a security network, it is used to create an extended communication channel distance between two nodes. In the end, we can meet our goal in this study by comparing the existing method to the performance analysis shown in a graph.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124455580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Convolutional Neural Network Model based Deep Learning Approach for Osteoporosis Fracture Detection 基于卷积神经网络模型的深度学习骨质疏松骨折检测方法
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127367
R. Dhanalakshmi, M. Thenmozhi, Swati Saxena, Hemalatha Mahalingam
Osteoporosis is a bone ailment which takes place because of minimum bone physique, damaging of micro-structure of bone, more over an excessive vulnerability to breakage. The main fitness difficulty throughout the globe is Osteoporosis, particularly in aged people. It may create spinal or hip breakages which can result in morbidity and burden. Hence the diagnosis of Osteoporosis at early stages and forecasting the existence of the fracture is highly essential. However automated analysis and diagnosis of osteoporosis from virtual radiographs could be very difficult as they have little variations. The proposed approach in this work uses high-dimensional textured function representations calculated from radiography pictures to distinguish healthy from osteoporotic issues. CNN helps to identify osteoporosis using structural MRI measurements of bone with high accuracy
骨质疏松症是一种骨骼疾病,发生的原因是最小的骨骼体质,破坏骨骼的微观结构,更多的是过度脆弱的断裂。全球主要的健身困难是骨质疏松症,尤其是老年人。它可能造成脊柱或髋部断裂,从而导致发病和负担。因此,早期诊断骨质疏松症和预测骨折的存在是非常必要的。然而,由于虚拟x线片的变化很小,因此对骨质疏松症的自动分析和诊断可能非常困难。在这项工作中提出的方法使用高维纹理函数表示从x线照片计算,以区分健康和骨质疏松问题。CNN帮助识别骨质疏松症使用骨结构MRI测量具有很高的准确性
{"title":"Convolutional Neural Network Model based Deep Learning Approach for Osteoporosis Fracture Detection","authors":"R. Dhanalakshmi, M. Thenmozhi, Swati Saxena, Hemalatha Mahalingam","doi":"10.1109/ICNWC57852.2023.10127367","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127367","url":null,"abstract":"Osteoporosis is a bone ailment which takes place because of minimum bone physique, damaging of micro-structure of bone, more over an excessive vulnerability to breakage. The main fitness difficulty throughout the globe is Osteoporosis, particularly in aged people. It may create spinal or hip breakages which can result in morbidity and burden. Hence the diagnosis of Osteoporosis at early stages and forecasting the existence of the fracture is highly essential. However automated analysis and diagnosis of osteoporosis from virtual radiographs could be very difficult as they have little variations. The proposed approach in this work uses high-dimensional textured function representations calculated from radiography pictures to distinguish healthy from osteoporotic issues. CNN helps to identify osteoporosis using structural MRI measurements of bone with high accuracy","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122217407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Label Classification On Aerial Images Using Deep Learning Techniques 基于深度学习技术的航空图像多标签分类
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127406
J. Jayasree, Angaluri Venu Madhavi, G. Geetha
The one of the main problems in multi-label aerial image classification is remote sensing (RS) or aerial images understanding it increases interest in some of the research domains. Individuals can efficiently perform it by inspecting the human visual objects contained in the scene and the spatiotopological relationships of these visual objects. Although most of the existing models are pre-trained on different datasets, those existing models present some difficulties. Nowadays, Convolutional Neural Networks (CNN) have proposed a feasible approach for Aerial image Classification. With this consideration, in this work, a Deep Learning model is provided namely a convolutional neural network (CNN). In particular, CNN is employed to produce high-level appearance features and learn how visual aspects of the picture can be perceived. Our proposed models i.e., EfficeintNetB7, MobileNetV2 and ResNet50 are tested on thoroughly used datasets, and the results obtained from our proposed models show better accuracy, precision, and recall compared to the other models. Keywords - Aerial Image Classification, Convolutional Neural Network(CNN), Deep Learning, Multi-label Remote Sensing, Spatio-topological relationships.
多标签航空图像分类的主要问题之一是遥感或航空图像的理解,它增加了一些研究领域的兴趣。个体可以通过观察场景中包含的人类视觉对象以及这些视觉对象之间的空间拓扑关系来有效地进行识别。虽然现有的大多数模型都是在不同的数据集上进行预训练的,但这些模型存在一些困难。目前,卷积神经网络(CNN)为航空图像分类提供了一种可行的方法。考虑到这一点,在这项工作中,提供了一个深度学习模型,即卷积神经网络(CNN)。特别是,CNN被用来产生高级的外观特征,并学习如何感知图像的视觉方面。我们提出的模型,即EfficeintNetB7, MobileNetV2和ResNet50,在完全使用的数据集上进行了测试,与其他模型相比,我们提出的模型获得的结果显示出更好的准确性,精度和召回率。关键词:航空图像分类,卷积神经网络(CNN),深度学习,多标签遥感,空间拓扑关系
{"title":"Multi-Label Classification On Aerial Images Using Deep Learning Techniques","authors":"J. Jayasree, Angaluri Venu Madhavi, G. Geetha","doi":"10.1109/ICNWC57852.2023.10127406","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127406","url":null,"abstract":"The one of the main problems in multi-label aerial image classification is remote sensing (RS) or aerial images understanding it increases interest in some of the research domains. Individuals can efficiently perform it by inspecting the human visual objects contained in the scene and the spatiotopological relationships of these visual objects. Although most of the existing models are pre-trained on different datasets, those existing models present some difficulties. Nowadays, Convolutional Neural Networks (CNN) have proposed a feasible approach for Aerial image Classification. With this consideration, in this work, a Deep Learning model is provided namely a convolutional neural network (CNN). In particular, CNN is employed to produce high-level appearance features and learn how visual aspects of the picture can be perceived. Our proposed models i.e., EfficeintNetB7, MobileNetV2 and ResNet50 are tested on thoroughly used datasets, and the results obtained from our proposed models show better accuracy, precision, and recall compared to the other models. Keywords - Aerial Image Classification, Convolutional Neural Network(CNN), Deep Learning, Multi-label Remote Sensing, Spatio-topological relationships.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129503801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly Based Intrusion Detection on IOT Devices using Logistic Regression 基于逻辑回归的物联网设备异常入侵检测
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127375
K. Sasikala, S. Vasuhi
The collecting and exchange of information without human intervention will soon be possible thanks to the Internet of Things. Numerous conflicts with IOT technology are emerging due to the fast increase in connected devices, including those related to diversity, expansibility, service quality, security requirements, and many more. IOT technology has advanced as a result oftechnological developments like machine learning. To reduce learning difficulty by computing features, factor selection, also called feature selection, is crucial, especially for a large, huge data set like network traffic. Despite the ease of the new selection approaches, it is actually not an easy task to do feature selection properly. The Internet of Things will soon make it feasible to gather and transmit information without human involvement. Due to the rapid growth in connected devices, a number of conflicts with IOT technologies are arising. These conflicts include those involving diversity, expansibility, quality of service, security needs, and many more. As a consequence of technical advancements like machine learning, IOT technology has improved. Factor selection, also known as feature selection, is essential to lessen the complexity of learning by computing features, especially for a massive, enormous data set like internet traffic. Even though the new selection methods are simple, selecting features correctly is a difficult undertaking. Systems that detect and prevent intrusions are the most popular technology for spotting suspicious behaviour and defending diverse infrastructures against network intrusions (IDPSs). On the UNSW (University of New South Wales) -NBl5 data set, our suggested logistic regression algorithm makes predictions of anomalies with an accuracy of 98% using the automated feature selection approach since the accuracy of the model depends on the feature. The dimensionality reduction approach is used to reduce the misleading data.
由于物联网,无需人工干预的信息收集和交换将很快成为可能。由于连接设备的快速增加,包括与多样性、可扩展性、服务质量、安全要求等相关的设备,与物联网技术的许多冲突正在出现。物联网技术的进步是机器学习等技术发展的结果。为了通过计算特征来降低学习难度,因素选择,也称为特征选择,是至关重要的,特别是对于像网络流量这样的大型数据集。尽管新的选择方法很容易,但正确地进行特征选择实际上并不是一件容易的事情。物联网将很快使无需人工参与的信息收集和传输成为可能。由于连接设备的快速增长,与物联网技术的一些冲突正在出现。这些冲突包括那些涉及多样性、可扩展性、服务质量、安全需求等等的冲突。由于机器学习等技术进步,物联网技术得到了改进。因子选择,也被称为特征选择,对于通过计算特征来减少学习的复杂性是必不可少的,特别是对于像互联网流量这样庞大的数据集。尽管新的选择方法很简单,但正确选择特征是一项艰巨的任务。检测和防止入侵的系统是发现可疑行为和保护各种基础设施免受网络入侵(idps)的最流行的技术。在UNSW(新南威尔士大学)-NBl5数据集上,我们建议的逻辑回归算法使用自动特征选择方法对异常进行预测,准确率达到98%,因为模型的准确性取决于特征。采用降维方法对误导数据进行降维处理。
{"title":"Anomaly Based Intrusion Detection on IOT Devices using Logistic Regression","authors":"K. Sasikala, S. Vasuhi","doi":"10.1109/ICNWC57852.2023.10127375","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127375","url":null,"abstract":"The collecting and exchange of information without human intervention will soon be possible thanks to the Internet of Things. Numerous conflicts with IOT technology are emerging due to the fast increase in connected devices, including those related to diversity, expansibility, service quality, security requirements, and many more. IOT technology has advanced as a result oftechnological developments like machine learning. To reduce learning difficulty by computing features, factor selection, also called feature selection, is crucial, especially for a large, huge data set like network traffic. Despite the ease of the new selection approaches, it is actually not an easy task to do feature selection properly. The Internet of Things will soon make it feasible to gather and transmit information without human involvement. Due to the rapid growth in connected devices, a number of conflicts with IOT technologies are arising. These conflicts include those involving diversity, expansibility, quality of service, security needs, and many more. As a consequence of technical advancements like machine learning, IOT technology has improved. Factor selection, also known as feature selection, is essential to lessen the complexity of learning by computing features, especially for a massive, enormous data set like internet traffic. Even though the new selection methods are simple, selecting features correctly is a difficult undertaking. Systems that detect and prevent intrusions are the most popular technology for spotting suspicious behaviour and defending diverse infrastructures against network intrusions (IDPSs). On the UNSW (University of New South Wales) -NBl5 data set, our suggested logistic regression algorithm makes predictions of anomalies with an accuracy of 98% using the automated feature selection approach since the accuracy of the model depends on the feature. The dimensionality reduction approach is used to reduce the misleading data.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129587899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Landslide Suspectibility Mapping Using Hybrid Deep Learning 基于混合深度学习的滑坡怀疑度映射
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127280
R. Depakkumar, N. Prasath
To put it simply, landslides are the collapse of a slope’s worth of land, posing a threat to human, animal, and man-made life under varying and often erratic climatic and lithological conditions. The development of cutting-edge space technology has allowed for the expansion of synthetic aperture radar (SAR) interferometry in the face of disaster. Copernicus Sentinel 1 SAR data products, with a temporal resolution of 12 days, are freely available, enriching periodic monitoring of the Earth’s surface. Over the course of several decades, differential SAR interferometry (DInSAR) techniques have been widely used for the purpose of tracking and identifying surface distortion. Over 105 landslides occurred in the Kodagu district of Karnataka during the 15th and 17th of August 2018. Before and after landslide occurrences, Sentinel-1 datasets acquired in Interferometric Wide Swath (IW) mode are utilised. Topographic and atmospheric inaccuracies have a significant impact on the displacement result derived from DInSAR. Due to its non-uniform accuracy variance, DEMs must be evaluated prior to being used for a variety of applications. DEMs and InSAR produced DEMs are evaluated with respect to their vertical and horizontal accuracy using Survey of India (SOI) toposheets as a standard of comparison. After considering their accuracy in both the vertical and horizontal planes, researchers have concluded that ALOS are the best option for topographic phase removal. Use of ALOS for InSAR analysis over the Kodagu district is recommended as it shows the least amount of error compared to other DEMs. Sentinel 1 can be utilised for assessment of larger landslides, and it is recommended to use corner reflectors to produce promising findings, according to a time series analysis done across the selected landslide regions using the Hybrid Deep Learning approach.
简而言之,山体滑坡是指在变化无常的气候和岩性条件下,山体滑坡对人类、动物和人造生命构成威胁。尖端空间技术的发展使合成孔径雷达(SAR)干涉测量技术在面对灾害时得以扩大。哥白尼哨兵1号SAR数据产品可免费获取,时间分辨率为12天,丰富了对地球表面的定期监测。在过去的几十年里,差分SAR干涉测量(DInSAR)技术被广泛用于跟踪和识别表面畸变。2018年8月15日和17日,卡纳塔克邦柯达古地区发生了超过105次山体滑坡。在滑坡发生前后,使用了以干涉宽幅(IW)模式获取的Sentinel-1数据集。地形和大气的不精度对DInSAR的位移结果有很大的影响。由于其不均匀的精度方差,在用于各种应用之前必须对dem进行评估。使用印度调查(SOI)地形图作为比较标准,对dem和InSAR生成的dem的垂直和水平精度进行评估。在考虑了它们在垂直和水平平面上的精度后,研究人员得出结论,ALOS是地形相位去除的最佳选择。建议使用ALOS对Kodagu地区进行InSAR分析,因为与其他dem相比,它显示的误差最小。Sentinel 1可用于评估较大的滑坡,根据使用混合深度学习方法在选定的滑坡区域进行的时间序列分析,建议使用角落反射器来产生有希望的发现。
{"title":"Landslide Suspectibility Mapping Using Hybrid Deep Learning","authors":"R. Depakkumar, N. Prasath","doi":"10.1109/ICNWC57852.2023.10127280","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127280","url":null,"abstract":"To put it simply, landslides are the collapse of a slope’s worth of land, posing a threat to human, animal, and man-made life under varying and often erratic climatic and lithological conditions. The development of cutting-edge space technology has allowed for the expansion of synthetic aperture radar (SAR) interferometry in the face of disaster. Copernicus Sentinel 1 SAR data products, with a temporal resolution of 12 days, are freely available, enriching periodic monitoring of the Earth’s surface. Over the course of several decades, differential SAR interferometry (DInSAR) techniques have been widely used for the purpose of tracking and identifying surface distortion. Over 105 landslides occurred in the Kodagu district of Karnataka during the 15th and 17th of August 2018. Before and after landslide occurrences, Sentinel-1 datasets acquired in Interferometric Wide Swath (IW) mode are utilised. Topographic and atmospheric inaccuracies have a significant impact on the displacement result derived from DInSAR. Due to its non-uniform accuracy variance, DEMs must be evaluated prior to being used for a variety of applications. DEMs and InSAR produced DEMs are evaluated with respect to their vertical and horizontal accuracy using Survey of India (SOI) toposheets as a standard of comparison. After considering their accuracy in both the vertical and horizontal planes, researchers have concluded that ALOS are the best option for topographic phase removal. Use of ALOS for InSAR analysis over the Kodagu district is recommended as it shows the least amount of error compared to other DEMs. Sentinel 1 can be utilised for assessment of larger landslides, and it is recommended to use corner reflectors to produce promising findings, according to a time series analysis done across the selected landslide regions using the Hybrid Deep Learning approach.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128234363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lip Detection and Recognition-A Review1 唇形检测与识别综述
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127483
Saloni Sharma, D. Malathi
It’s no secret that security systems rely heavily on image processing because of its versatility. Two-dimensional visuals, intricate algorithms, and instantaneous decision-making are all challenges that must be met by the system. It is possible to optimize the system at one of four stages: preprocessing, feature extraction, Lip detection, and Recognition. Using modern computing hardware and software, we can create a system that is both easy to use and exactly what we need. Unfortunately, as more characteristics are added, the complexity of implementing these algorithms grows. The process is improved through the development of novel approaches, tools, and strategies. Machine learning and AI techniques have recently been applied to image processing applications. Standard methods of authentication, such as passwords and PINs, are becoming increasingly insecure. Physical and biological characteristics that are unique to each individual provide the best level of security. It is vulnerable to guessing and theft in business and public computer networks. Plastic cards, smart cards, and computer token cards all have non-security flaws in the form of forgery, loss, corruption, and inaccessibility. Identifying techniques based on biometrics have several applications in forensics, finance, and other fields. Voluntary action from the past has the drawbacks of being difficult to implement and not adaptable for covert uses, such as in surveillance applications. Lip image audit and verification during biometrics record keeping is prone to human error. Image quality of the lips is more easily obtained than fingerprint images. Only about five percent of the population has imperfect fingerprints and cannot be verified. Reasons include but are not limited to dry skin, diseased skin, elderly skin, wounded skin, calloused finger, oriental skin, bandaged finger, narrow finger, smeared sensor on reader, etc. Varying lighting conditions are widely recognized as one of the most crucial aspects for accurate Lip recognition but also one of its greatest obstacles. Simultaneously, the same person's lip expression can look extremely different depending on the illumination.
众所周知,由于图像处理的多功能性,安全系统严重依赖于它。二维视觉、复杂的算法和即时决策都是系统必须面对的挑战。有可能在四个阶段之一优化系统:预处理,特征提取,唇检测和识别。使用现代计算机硬件和软件,我们可以创建一个既易于使用又完全符合我们需要的系统。不幸的是,随着特征的增加,实现这些算法的复杂性也在增加。该过程通过开发新的方法、工具和策略得到改进。机器学习和人工智能技术最近被应用于图像处理应用。标准的身份验证方法,如密码和pin,正变得越来越不安全。每个人独特的生理和生物特征提供了最佳的安全级别。在商业和公共计算机网络中,它很容易被猜测和窃取。塑料卡、智能卡和计算机令牌卡都存在伪造、丢失、损坏和不可访问等非安全缺陷。基于生物识别技术的识别技术在法医学、金融和其他领域有很多应用。过去的自愿行动具有难以实施和不适合隐蔽用途的缺点,例如在监视应用中。在生物特征记录保存过程中,唇形图像审计和验证容易出现人为错误。唇的图像质量比指纹图像更容易获得。只有大约5%的人指纹不完整,无法核实。原因包括但不限于皮肤干燥、皮肤病变、老年皮肤、皮肤受伤、手指老茧、东方皮肤、手指包扎、手指狭窄、读取器上的传感器涂抹等。不同的光照条件被广泛认为是实现准确唇形识别的最关键因素之一,但也是最大的障碍之一。同时,同一个人的嘴唇表情可能会因光照的不同而大相径庭。
{"title":"Lip Detection and Recognition-A Review1","authors":"Saloni Sharma, D. Malathi","doi":"10.1109/ICNWC57852.2023.10127483","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127483","url":null,"abstract":"It’s no secret that security systems rely heavily on image processing because of its versatility. Two-dimensional visuals, intricate algorithms, and instantaneous decision-making are all challenges that must be met by the system. It is possible to optimize the system at one of four stages: preprocessing, feature extraction, Lip detection, and Recognition. Using modern computing hardware and software, we can create a system that is both easy to use and exactly what we need. Unfortunately, as more characteristics are added, the complexity of implementing these algorithms grows. The process is improved through the development of novel approaches, tools, and strategies. Machine learning and AI techniques have recently been applied to image processing applications. Standard methods of authentication, such as passwords and PINs, are becoming increasingly insecure. Physical and biological characteristics that are unique to each individual provide the best level of security. It is vulnerable to guessing and theft in business and public computer networks. Plastic cards, smart cards, and computer token cards all have non-security flaws in the form of forgery, loss, corruption, and inaccessibility. Identifying techniques based on biometrics have several applications in forensics, finance, and other fields. Voluntary action from the past has the drawbacks of being difficult to implement and not adaptable for covert uses, such as in surveillance applications. Lip image audit and verification during biometrics record keeping is prone to human error. Image quality of the lips is more easily obtained than fingerprint images. Only about five percent of the population has imperfect fingerprints and cannot be verified. Reasons include but are not limited to dry skin, diseased skin, elderly skin, wounded skin, calloused finger, oriental skin, bandaged finger, narrow finger, smeared sensor on reader, etc. Varying lighting conditions are widely recognized as one of the most crucial aspects for accurate Lip recognition but also one of its greatest obstacles. Simultaneously, the same person's lip expression can look extremely different depending on the illumination.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133102105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diagnosing Progressive Face Recognition from Face Morphing Using ViT Technique Through DL Approach 基于深度学习的ViT技术诊断人脸变形的渐进式识别
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127374
M.K. Mohamed Faizal, S. Geetha, A. Barveen
The face-morphing attack, which occurs in private, public, and governmental institutions, is one of the most well-known in today’s world. Face recognition systems tend to be vulnerable if the face images are manipulated with duplicate images. Manipulated images are combined with the original image so that the images look like legitimate ones. Several face recognition studies are being conducted to determine whether the face images are manipulated. Using the DL algorithm, the face image is trained to attain the original and morphed face images by recognizing the face images. DL algorithms determine the images by classifying whether they are morphs or not recognizable to humans. In this paper, the foremost emphasis is on diagnosing the face recognition from those face-morphed images using the different DL techniques. Different DL techniques are effectively compared, where the ViT transformer attains improved accuracy when compared to Resnet, RNN, and CNN, respectively. This paper provides an overview of the various deep learning algorithms for detecting those face recognition images that focus on challenges and issues in the facial datasets from Face Recognition Kaggle dataset with training and testing image dataset. It determines the higher contrast in image efficiency and the evaluation of the face recognized images with an improved image.
这种面部变形攻击发生在私人、公共和政府机构中,是当今世界上最著名的攻击之一。如果人脸图像被重复图像操纵,人脸识别系统往往是脆弱的。经过处理的图像与原始图像相结合,使图像看起来像合法的图像。一些人脸识别研究正在进行,以确定人脸图像是否被操纵。利用深度学习算法对人脸图像进行训练,通过对人脸图像的识别得到原始和变形后的人脸图像。DL算法通过分类来确定图像是否为人类可识别的变形或不可识别。本文的重点是利用不同的深度学习技术对这些变形图像进行人脸识别诊断。对不同的深度学习技术进行了有效的比较,其中ViT变压器分别比Resnet、RNN和CNN获得了更高的精度。本文概述了用于检测人脸识别图像的各种深度学习算法,重点关注来自人脸识别Kaggle数据集的人脸数据集中的挑战和问题,以及训练和测试图像数据集。它决定了图像效率和对改进后的人脸识别图像的评价具有更高的对比度。
{"title":"Diagnosing Progressive Face Recognition from Face Morphing Using ViT Technique Through DL Approach","authors":"M.K. Mohamed Faizal, S. Geetha, A. Barveen","doi":"10.1109/ICNWC57852.2023.10127374","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127374","url":null,"abstract":"The face-morphing attack, which occurs in private, public, and governmental institutions, is one of the most well-known in today’s world. Face recognition systems tend to be vulnerable if the face images are manipulated with duplicate images. Manipulated images are combined with the original image so that the images look like legitimate ones. Several face recognition studies are being conducted to determine whether the face images are manipulated. Using the DL algorithm, the face image is trained to attain the original and morphed face images by recognizing the face images. DL algorithms determine the images by classifying whether they are morphs or not recognizable to humans. In this paper, the foremost emphasis is on diagnosing the face recognition from those face-morphed images using the different DL techniques. Different DL techniques are effectively compared, where the ViT transformer attains improved accuracy when compared to Resnet, RNN, and CNN, respectively. This paper provides an overview of the various deep learning algorithms for detecting those face recognition images that focus on challenges and issues in the facial datasets from Face Recognition Kaggle dataset with training and testing image dataset. It determines the higher contrast in image efficiency and the evaluation of the face recognized images with an improved image.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134556409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A 2.4GHz Rectangular Shaped Patch Antenna for ZigBee Application 一种用于ZigBee的2.4GHz矩形贴片天线
Pub Date : 2023-04-05 DOI: 10.1109/ICNWC57852.2023.10127535
J. Jasmine Hephzipah, B. Sarala, M. Logeshwaran, M.G. Kumara Vijay, M. Jyoth Varshan, S. Harish
ZigBee is a low-rate task group 4, Personal Area Network task group. It’s a type of technology for home networking. For controlling and detecting the network, a technological standard called ZigBee was established. For short-range wireless communication, a protocol termed ZigBee resolves the demand for comparatively affordable deployment of low-power devices, with lower bit rates. Under IEEE 802.15.4 ZigBee technology, ZigBee antenna is a radio frequency antenna, with ability to transmit and, receive radio waves. These serve a crucial part in the operation of ZigBee’s low-power, wireless personal area networks. Thus a patch antenna of 2. 4GHz is made with dimensions of 39x47.8mm2 with FR-4(Lossy) as substrate, with thickness of 1. 6mm and copper as a patch. VSWR of 1.06, a bandwidth of 110. 25MHz, and a gain of 2. 76dB, return loss of -29.77dB is achieved. The radiation pattern is omnidirectional. The simulated findings and the values obtained agree rather well.
ZigBee是一个低速率任务组4,个人区域网络任务组。这是一种家庭网络技术。为了控制和检测网络,建立了一种称为ZigBee的技术标准。对于短距离无线通信,称为ZigBee的协议解决了对低功耗设备相对负担得起的部署需求,具有较低的比特率。在IEEE 802.15.4 ZigBee技术下,ZigBee天线是一种射频天线,具有发射和接收无线电波的能力。这些在ZigBee的低功耗无线个人区域网络的运行中起着至关重要的作用。因此,贴片天线为2。4GHz的尺寸为39x47.8mm2,以FR-4(有损)为衬底,厚度为1。6毫米和铜作为补丁。VSWR为1.06,带宽为110。25MHz,增益2。76dB,回波损耗达到-29.77dB。辐射模式是全方位的。模拟结果与所得值吻合较好。
{"title":"A 2.4GHz Rectangular Shaped Patch Antenna for ZigBee Application","authors":"J. Jasmine Hephzipah, B. Sarala, M. Logeshwaran, M.G. Kumara Vijay, M. Jyoth Varshan, S. Harish","doi":"10.1109/ICNWC57852.2023.10127535","DOIUrl":"https://doi.org/10.1109/ICNWC57852.2023.10127535","url":null,"abstract":"ZigBee is a low-rate task group 4, Personal Area Network task group. It’s a type of technology for home networking. For controlling and detecting the network, a technological standard called ZigBee was established. For short-range wireless communication, a protocol termed ZigBee resolves the demand for comparatively affordable deployment of low-power devices, with lower bit rates. Under IEEE 802.15.4 ZigBee technology, ZigBee antenna is a radio frequency antenna, with ability to transmit and, receive radio waves. These serve a crucial part in the operation of ZigBee’s low-power, wireless personal area networks. Thus a patch antenna of 2. 4GHz is made with dimensions of 39x47.8mm2 with FR-4(Lossy) as substrate, with thickness of 1. 6mm and copper as a patch. VSWR of 1.06, a bandwidth of 110. 25MHz, and a gain of 2. 76dB, return loss of -29.77dB is achieved. The radiation pattern is omnidirectional. The simulated findings and the values obtained agree rather well.","PeriodicalId":197525,"journal":{"name":"2023 International Conference on Networking and Communications (ICNWC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133531128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 International Conference on Networking and Communications (ICNWC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1