首页 > 最新文献

Int. J. Commun. Networks Inf. Secur.最新文献

英文 中文
Security of Big Data over IoT Environment by Integration of Deep Learning and Optimization 深度学习与优化融合的物联网环境下大数据安全
Pub Date : 2022-09-30 DOI: 10.17762/ijcnis.v14i2.5510
N. N. Alleema, R. Raman, Fidel Castro-Cayllahua, V. Rathod, J. Cotrina-Aliaga, S. Ajagekar, R. Kanse
This is especially true given the spread of IoT, which makes it possible for two-way communication between various electronic devices and is therefore essential to contemporary living. However, it has been shown that IoT may be readily exploited. There is a need to develop new technology or combine existing ones to address these security issues. DL, a kind of ML, has been used in earlier studies to discover security breaches with good results. IoT device data is abundant, diverse, and trustworthy. Thus, improved performance and data management are attainable with help of big data technology. The current state of IoT security, big data, and deep learning led to an all-encompassing study of the topic. This study examines the interrelationships of big data, IoT security, and DL technologies, and draws parallels between these three areas. Technical works in all three fields have been compared, allowing for the development of a thematic taxonomy. Finally, we have laid the groundwork for further investigation into IoT security concerns by identifying and assessing the obstacles inherent in using DL for security utilizing big data. The security of large data has been taken into consideration in this article by categorizing various dangers using a deep learning method. The purpose of optimization is to raise both accuracy and performance.
考虑到物联网的普及,这一点尤其正确,物联网使各种电子设备之间的双向通信成为可能,因此对当代生活至关重要。然而,已经证明物联网可能很容易被利用。有必要开发新技术或结合现有技术来解决这些安全问题。DL是机器学习的一种,在早期的研究中被用于发现安全漏洞,并取得了良好的效果。物联网设备数据丰富、多样、可信。因此,在大数据技术的帮助下,可以提高性能和数据管理。物联网安全、大数据和深度学习的现状导致了对该主题的全面研究。本研究考察了大数据、物联网安全和深度学习技术之间的相互关系,并得出了这三个领域之间的相似之处。对所有三个领域的技术工作进行了比较,以便制定专题分类法。最后,我们通过识别和评估利用大数据使用深度学习安全所固有的障碍,为进一步调查物联网安全问题奠定了基础。本文通过使用深度学习方法对各种危险进行分类,考虑了大数据的安全性。优化的目的是提高准确性和性能。
{"title":"Security of Big Data over IoT Environment by Integration of Deep Learning and Optimization","authors":"N. N. Alleema, R. Raman, Fidel Castro-Cayllahua, V. Rathod, J. Cotrina-Aliaga, S. Ajagekar, R. Kanse","doi":"10.17762/ijcnis.v14i2.5510","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5510","url":null,"abstract":"This is especially true given the spread of IoT, which makes it possible for two-way communication between various electronic devices and is therefore essential to contemporary living. However, it has been shown that IoT may be readily exploited. There is a need to develop new technology or combine existing ones to address these security issues. DL, a kind of ML, has been used in earlier studies to discover security breaches with good results. IoT device data is abundant, diverse, and trustworthy. Thus, improved performance and data management are attainable with help of big data technology. The current state of IoT security, big data, and deep learning led to an all-encompassing study of the topic. This study examines the interrelationships of big data, IoT security, and DL technologies, and draws parallels between these three areas. Technical works in all three fields have been compared, allowing for the development of a thematic taxonomy. Finally, we have laid the groundwork for further investigation into IoT security concerns by identifying and assessing the obstacles inherent in using DL for security utilizing big data. The security of large data has been taken into consideration in this article by categorizing various dangers using a deep learning method. The purpose of optimization is to raise both accuracy and performance.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125198966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Physical System Based Smart Healthcare System with Federated Deep Learning Architectures with Data Analytics 基于网络物理系统的智能医疗保健系统,具有数据分析的联邦深度学习架构
Pub Date : 2022-09-30 DOI: 10.17762/ijcnis.v14i2.5513
Dadang Hermawan, Ni Made Dewi Kansa Putri, Lucky Kartanto
Data shared between hospitals and patients using mobile and wearable Internet of Medical Things (IoMT) devices raises privacy concerns due to the methods used in training. the development of the Internet of Medical Things (IoMT) and related technologies and the most current advances in these areas The Internet of Medical Things and other recent technological advancements have transformed the traditional healthcare system into a smart one. improvement in computing power and the spread of information have transformed the healthcare system into a high-tech, data-driven operation. On the other hand, mobile and wearable IoMT devices present privacy concerns regarding the data transmitted between hospitals and end users because of the way in which artificial intelligence is trained (AI-centralized). In terms of machine learning (AI-centralized). Devices connected to the IoMT network transmit highly confidential information that could be intercepted by adversaries. Due to the portability of electronic health record data for clinical research made possible by medical cyber-physical systems, the rate at which new scientific discoveries can be made has increased. While AI helps improve medical informatics, the current methods of centralised data training and insecure data storage management risk exposing private medical information to unapproved foreign organisations. New avenues for protecting users' privacy in IoMT without requiring access to their data have been opened by the federated learning (FL) distributive AI paradigm. FL safeguards user privacy by concealing all but gradients during training. DeepFed is a novel Federated Deep Learning approach presented in this research for the purpose of detecting cyber threats to intelligent healthcare CPSs.
医院和患者之间使用移动和可穿戴医疗物联网(IoMT)设备共享的数据由于培训中使用的方法引起了隐私问题。医疗物联网(IoMT)和相关技术的发展以及这些领域的最新进展医疗物联网和其他最近的技术进步已经将传统的医疗保健系统转变为智能医疗系统。计算能力的提高和信息的传播已经将医疗保健系统转变为高科技、数据驱动的操作。另一方面,由于人工智能的训练方式(以人工智能为中心),移动和可穿戴物联网设备在医院和最终用户之间传输的数据存在隐私问题。在机器学习方面(以ai为中心)。连接到IoMT网络的设备传输高度机密的信息,这些信息可能被对手拦截。由于医疗信息物理系统使临床研究的电子健康记录数据的可移植性成为可能,新的科学发现的速度可以增加。虽然人工智能有助于改善医疗信息学,但目前的集中数据培训方法和不安全的数据存储管理有可能将私人医疗信息暴露给未经批准的外国组织。联邦学习(FL)分布式人工智能范式为在IoMT中保护用户隐私而不需要访问他们的数据开辟了新的途径。FL通过隐藏训练期间的梯度来保护用户隐私。DeepFed是本研究中提出的一种新颖的联邦深度学习方法,用于检测智能医疗保健cps的网络威胁。
{"title":"Cyber Physical System Based Smart Healthcare System with Federated Deep Learning Architectures with Data Analytics","authors":"Dadang Hermawan, Ni Made Dewi Kansa Putri, Lucky Kartanto","doi":"10.17762/ijcnis.v14i2.5513","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5513","url":null,"abstract":"Data shared between hospitals and patients using mobile and wearable Internet of Medical Things (IoMT) devices raises privacy concerns due to the methods used in training. the development of the Internet of Medical Things (IoMT) and related technologies and the most current advances in these areas The Internet of Medical Things and other recent technological advancements have transformed the traditional healthcare system into a smart one. improvement in computing power and the spread of information have transformed the healthcare system into a high-tech, data-driven operation. On the other hand, mobile and wearable IoMT devices present privacy concerns regarding the data transmitted between hospitals and end users because of the way in which artificial intelligence is trained (AI-centralized). In terms of machine learning (AI-centralized). Devices connected to the IoMT network transmit highly confidential information that could be intercepted by adversaries. Due to the portability of electronic health record data for clinical research made possible by medical cyber-physical systems, the rate at which new scientific discoveries can be made has increased. While AI helps improve medical informatics, the current methods of centralised data training and insecure data storage management risk exposing private medical information to unapproved foreign organisations. New avenues for protecting users' privacy in IoMT without requiring access to their data have been opened by the federated learning (FL) distributive AI paradigm. FL safeguards user privacy by concealing all but gradients during training. DeepFed is a novel Federated Deep Learning approach presented in this research for the purpose of detecting cyber threats to intelligent healthcare CPSs.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"309 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134041334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wearable Sensors for Evaluation Over Smart Home Using Sequential Minimization Optimization-based Random Forest 基于顺序最小化优化随机森林的智能家居可穿戴传感器评估
Pub Date : 2022-09-10 DOI: 10.17762/ijcnis.v14i2.5499
Neeraj Gupta, S. Janani, R. Dilip, Ravi Hosur, Abhay Chaturvedi, Ankur Gupta
In our everyday life records, human activity identification utilizing MotionNode sensors is becoming more and more prominent. A difficult issue in ubiquitous computing and HCI is providing reliable data on human actions and behaviors. In this study, we put forward a practical methodology for incorporating statistical data into Sequential Minimization Optimization-based random forests. In order to extract useful features, we first prepared a 1-Dimensional Hadamard transform wavelet and a 1-Dimensional Local Binary Pattern-dependent extraction technique. Over two benchmark datasets, the University of Southern California-Human Activities Dataset, and the IM-Sporting Behaviors datasets, we employed sequential minimum optimization together with Random Forest to classify activities. Experimental findings demonstrate that our suggested model may successfully be utilized to identify strong human actions for matters related to efficiency and accuracy, and may challenge with existing cutting-edge approaches.
在我们的日常生活记录中,利用MotionNode传感器进行人体活动识别变得越来越突出。普适计算和HCI中的一个难题是提供关于人类行为和行为的可靠数据。在这项研究中,我们提出了一种实用的方法,将统计数据纳入基于顺序最小化优化的随机森林。为了提取有用的特征,我们首先制备了一维Hadamard变换小波和一维局部二值模式相关提取技术。在两个基准数据集上,南加州大学人类活动数据集和im运动行为数据集,我们使用顺序最小优化和随机森林来对活动进行分类。实验结果表明,我们提出的模型可以成功地用于识别与效率和准确性相关的强烈人类行为,并可能挑战现有的前沿方法。
{"title":"Wearable Sensors for Evaluation Over Smart Home Using Sequential Minimization Optimization-based Random Forest","authors":"Neeraj Gupta, S. Janani, R. Dilip, Ravi Hosur, Abhay Chaturvedi, Ankur Gupta","doi":"10.17762/ijcnis.v14i2.5499","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5499","url":null,"abstract":"In our everyday life records, human activity identification utilizing MotionNode sensors is becoming more and more prominent. A difficult issue in ubiquitous computing and HCI is providing reliable data on human actions and behaviors. In this study, we put forward a practical methodology for incorporating statistical data into Sequential Minimization Optimization-based random forests. In order to extract useful features, we first prepared a 1-Dimensional Hadamard transform wavelet and a 1-Dimensional Local Binary Pattern-dependent extraction technique. Over two benchmark datasets, the University of Southern California-Human Activities Dataset, and the IM-Sporting Behaviors datasets, we employed sequential minimum optimization together with Random Forest to classify activities. Experimental findings demonstrate that our suggested model may successfully be utilized to identify strong human actions for matters related to efficiency and accuracy, and may challenge with existing cutting-edge approaches.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129506711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Security Enhancement by Identifying Attacks Using Machine Learning for 5G Network 利用机器学习识别5G网络攻击以增强安全性
Pub Date : 2022-09-10 DOI: 10.17762/ijcnis.v14i2.5494
Hitesh Keserwani, Himanshu Rastogi, Ardhariksa Zukhruf Kurniullah, Sushil Kumar Janardan, R. Raman, V. Rathod, Ankur Gupta
Need of security enhancement for 5G network has been increased in last decade. Data transmitted over network need to be secure from external attacks. Thus there is need to enhance the security during data transmission over 5G network. There remains different security system that focus on identification of attacks. In order to identify attack different machine learning mechanism are considered. But the issue with existing research work is limited security and performance issue. There remains need to enhance security of 5G network. To achieve this objective hybrid mechanism are introduced. Different treats such as Denial-of-Service, Denial-of-Detection, Unfair use or resources are classified using enhanced machine learning approach. Proposed work has make use of LSTM model to improve accuracy during decision making and classification of attack of 5G network. Research work is considering accuracy parameters such as Recall, precision and F-Score to assure the reliability of proposed model. Simulation results conclude that proposed model is providing better accuracy as compared to conventional model.
近十年来,5G网络的安全性增强需求不断增加。通过网络传输的数据需要防止外部攻击。因此,需要在5G网络中增强数据传输的安全性。仍然有不同的安全系统侧重于识别攻击。为了识别攻击,考虑了不同的机器学习机制。但是现有的研究工作存在的问题是有限的安全和性能问题。5G网络的安全性还有待加强。为了实现这一目标,引入了混合机构。使用增强的机器学习方法对拒绝服务、拒绝检测、不公平使用或资源等不同的对待进行分类。提出的工作利用LSTM模型来提高5G网络攻击决策和分类的准确性。研究工作考虑了查全率、查准率和F-Score等精度参数,以保证模型的可靠性。仿真结果表明,与传统模型相比,该模型具有更好的精度。
{"title":"Security Enhancement by Identifying Attacks Using Machine Learning for 5G Network","authors":"Hitesh Keserwani, Himanshu Rastogi, Ardhariksa Zukhruf Kurniullah, Sushil Kumar Janardan, R. Raman, V. Rathod, Ankur Gupta","doi":"10.17762/ijcnis.v14i2.5494","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5494","url":null,"abstract":"Need of security enhancement for 5G network has been increased in last decade. Data transmitted over network need to be secure from external attacks. Thus there is need to enhance the security during data transmission over 5G network. There remains different security system that focus on identification of attacks. In order to identify attack different machine learning mechanism are considered. But the issue with existing research work is limited security and performance issue. There remains need to enhance security of 5G network. To achieve this objective hybrid mechanism are introduced. Different treats such as Denial-of-Service, Denial-of-Detection, Unfair use or resources are classified using enhanced machine learning approach. Proposed work has make use of LSTM model to improve accuracy during decision making and classification of attack of 5G network. Research work is considering accuracy parameters such as Recall, precision and F-Score to assure the reliability of proposed model. Simulation results conclude that proposed model is providing better accuracy as compared to conventional model.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133690787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Construction of Data Driven Decomposition Based Soft Sensors with Auto Encoder Deep Neural Network for IoT Healthcare Applications 基于自编码器深度神经网络的数据驱动分解软传感器构建
Pub Date : 2022-09-10 DOI: 10.17762/ijcnis.v14i2.5495
M. Sowmya, Sunil Sharma, Akash Kumar Bhagat, Pooja Verma, Sunny Verma, Durgesh Wadhwa
The architecture of IoT healthcare is motivated towards the data-driven realization and patient-centric health models, whereas the personalized assistance is provided by deploying the advanced sensors. According to the procedures in surgery, in the emergency unit, the patients are monitored till they are stable physically and then shifted to ward for further recovery and evaluation. Normally evaluation done in ward doesn’t suggest continuous parameters monitoring for physiological condition and thus relapse of patients are common. In real-time healthcare applications, the vital parameters will be estimated through dedicated sensors, that are still luxurious at the present situation and highly sensitive to harsh conditions of environment. Furthermore, for real-time monitoring, delay is usually present in the sensors. Because of these issues, data-driven soft sensors are highly attractive alternatives. This research is motivated towards this fact and Auto Encoder Deep Neural Network (AutoEncDeepNN) is proposed depending on Health Framework in the internet assisting the patients with trigger-based sensor activation model to manage master and slave sensors. The advantage of the proposed method is that the hidden information are mined automatically from the sensors and high representative features are generated by multiple layer’s iteration. This goal is consistently achieved and thus the proposed model outperforms few standard approaches which are considered like Hierarchical Extreme Learning Machine (HELM), Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM). It is found that the proposed AutoEncDeepNN method achieves 94.72% of accuracy, 41.96% of RMSE, 34.16% of RAE and 48.68% of MAE in 74.64 ms.
物联网医疗的架构是朝着数据驱动的实现和以患者为中心的健康模型发展的,而个性化的帮助是通过部署先进的传感器来提供的。根据外科的程序,在急诊科,对患者进行监测,直到他们身体稳定,然后转移到病房进行进一步的恢复和评估。通常在病房内进行的评估不建议对生理状况进行连续的参数监测,因此患者复发是常见的。在实时医疗应用中,关键参数将通过专用传感器进行估计,这些传感器在目前的情况下仍然是豪华的,对恶劣的环境条件非常敏感。此外,对于实时监测,延迟通常存在于传感器。由于这些问题,数据驱动的软传感器是非常有吸引力的替代品。基于这一事实,本研究提出了基于互联网健康框架的自动编码器深度神经网络(AutoEncDeepNN),通过基于触发的传感器激活模型来帮助患者管理主、从传感器。该方法的优点是自动从传感器中挖掘隐藏信息,并通过多层迭代生成高代表性特征。这一目标是一致实现的,因此所提出的模型优于一些标准方法,如层次极限学习机(HELM),卷积神经网络(CNN)和长短期记忆(LSTM)。结果表明,该方法在74.64 ms内,准确率达到94.72%,RMSE达到41.96%,RAE达到34.16%,MAE达到48.68%。
{"title":"Construction of Data Driven Decomposition Based Soft Sensors with Auto Encoder Deep Neural Network for IoT Healthcare Applications","authors":"M. Sowmya, Sunil Sharma, Akash Kumar Bhagat, Pooja Verma, Sunny Verma, Durgesh Wadhwa","doi":"10.17762/ijcnis.v14i2.5495","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5495","url":null,"abstract":"The architecture of IoT healthcare is motivated towards the data-driven realization and patient-centric health models, whereas the personalized assistance is provided by deploying the advanced sensors. According to the procedures in surgery, in the emergency unit, the patients are monitored till they are stable physically and then shifted to ward for further recovery and evaluation. Normally evaluation done in ward doesn’t suggest continuous parameters monitoring for physiological condition and thus relapse of patients are common. In real-time healthcare applications, the vital parameters will be estimated through dedicated sensors, that are still luxurious at the present situation and highly sensitive to harsh conditions of environment. Furthermore, for real-time monitoring, delay is usually present in the sensors. Because of these issues, data-driven soft sensors are highly attractive alternatives. This research is motivated towards this fact and Auto Encoder Deep Neural Network (AutoEncDeepNN) is proposed depending on Health Framework in the internet assisting the patients with trigger-based sensor activation model to manage master and slave sensors. The advantage of the proposed method is that the hidden information are mined automatically from the sensors and high representative features are generated by multiple layer’s iteration. This goal is consistently achieved and thus the proposed model outperforms few standard approaches which are considered like Hierarchical Extreme Learning Machine (HELM), Convolutional Neural Network (CNN) and Long Short-Term Memory (LSTM). It is found that the proposed AutoEncDeepNN method achieves 94.72% of accuracy, 41.96% of RMSE, 34.16% of RAE and 48.68% of MAE in 74.64 ms.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126084801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal Sentiment Sensing and Emotion Recognition Based on Cognitive Computing Using Hidden Markov Model with Extreme Learning Machine 基于隐马尔可夫模型和极限学习机的认知计算的多模态情绪感知和情绪识别
Pub Date : 2022-09-10 DOI: 10.17762/ijcnis.v14i2.5496
Diksha Verma, Sweta Kumari Barnwal, Amit Barve, M. J. Kannan, Rajesh Gupta, R. Swaminathan
In today's competitive business environment, exponential increase of multimodal content results in a massive amount of shapeless data. Big data that is unstructured has no specific format or organisation and can take any form, including text, audio, photos, and video. Many assumptions and algorithms are generally required to recognize different emotions as per literature survey, and the main focus for emotion recognition is based on single modality, such as voice, facial expression and bio signals. This paper proposed the novel technique in multimodal sentiment sensing with emotion recognition using artificial intelligence technique. Here the audio and visual data has been collected based on social media review and classified using hidden Markov model based extreme learning machine (HMM_ExLM). The features are trained using this method. Simultaneously, these speech emotional traits are suitably maximised. The strategy of splitting areas is employed in the research for expression photographs and various weights are provided to each area to extract information. Speech as well as facial expression data are then merged using decision level fusion and speech properties of each expression in region of face are utilized to categorize. Findings of experiments show that combining features of speech and expression boosts effect greatly when compared to using either speech or expression alone. In terms of accuracy, recall, precision, and optimization level, a parametric comparison was made.
在当今竞争激烈的商业环境中,多模式内容的指数级增长导致了大量的无形数据。非结构化的大数据没有特定的格式或组织,可以采取任何形式,包括文本、音频、照片和视频。从文献综述来看,识别不同的情绪通常需要许多假设和算法,而情感识别的主要关注点是基于单一的模态,如语音、面部表情和生物信号。本文提出了一种基于人工智能技术的多模态情感感知与情感识别新技术。在这里,音频和视频数据是基于社交媒体评论收集的,并使用基于隐马尔可夫模型的极限学习机(HMM_ExLM)进行分类。使用该方法对特征进行训练。同时,这些言语情感特征被适当地最大化。在表情照片的研究中采用了分割区域的策略,并对每个区域赋予不同的权重来提取信息。然后使用决策级融合将语音和面部表情数据合并,并利用面部区域中每个表情的语音属性进行分类。实验结果表明,与单独使用语言或表情相比,将语言和表情特征结合起来可以大大提高效果。在正确率、召回率、精密度和优化水平方面进行了参数比较。
{"title":"Multimodal Sentiment Sensing and Emotion Recognition Based on Cognitive Computing Using Hidden Markov Model with Extreme Learning Machine","authors":"Diksha Verma, Sweta Kumari Barnwal, Amit Barve, M. J. Kannan, Rajesh Gupta, R. Swaminathan","doi":"10.17762/ijcnis.v14i2.5496","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5496","url":null,"abstract":"In today's competitive business environment, exponential increase of multimodal content results in a massive amount of shapeless data. Big data that is unstructured has no specific format or organisation and can take any form, including text, audio, photos, and video. Many assumptions and algorithms are generally required to recognize different emotions as per literature survey, and the main focus for emotion recognition is based on single modality, such as voice, facial expression and bio signals. This paper proposed the novel technique in multimodal sentiment sensing with emotion recognition using artificial intelligence technique. Here the audio and visual data has been collected based on social media review and classified using hidden Markov model based extreme learning machine (HMM_ExLM). The features are trained using this method. Simultaneously, these speech emotional traits are suitably maximised. The strategy of splitting areas is employed in the research for expression photographs and various weights are provided to each area to extract information. Speech as well as facial expression data are then merged using decision level fusion and speech properties of each expression in region of face are utilized to categorize. Findings of experiments show that combining features of speech and expression boosts effect greatly when compared to using either speech or expression alone. In terms of accuracy, recall, precision, and optimization level, a parametric comparison was made.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125383321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Neurological Disorders Detection Based on Computer Brain Interface Using Centralized Blockchain with Intrusion System 基于集中式区块链入侵系统的计算机脑接口神经系统疾病检测
Pub Date : 2022-09-10 DOI: 10.17762/ijcnis.v14i2.5498
I. Yuwono, Eviani Damastuti Utomo
A brain-computer interface (BCI) would afford real-time communication, pointedly refining the standard of lifespan, brain-to-internet (B2I) connection, and interaction between the external digital devices and the brain. This assistive technology invents information and transmission advancement patterns, like directly linking the brain and multimedia gadgets to the cyber world. This system will convert brain data to signals which is understandable by multimedia gadgets without physical intervention and exchanges human-related languages with external atmosphere control protocols. These progressive difficulties would limit security severely. Hence, the rate of ransomware, attacks, malware, and other types of vulnerabilities will be rising radically. On the other hand, the necessity to enhance conventional processes for investigating cyberenvironment security facets. This article presents a Neurological Disorders Detection based on Computer Brain Interface Using Centralized Blockchain with Intrusion System (NDDCBI-CBIS). The projected NDDCBI-CBIS technique focuses on the identification of neurological disorders and epileptic seizure detection. To attain this, the presented NDDCBI-CBIS technique pre-processes the biomedical signals. Next, to detect epileptic seizures, long short-term memory (LSTM) model is applied. The experimental evaluation of the NDDCBI-CBIS approach can be tested by making use of the medical dataset and the outcomes inferred from the enhanced outcomes of the NDDCBI-CBIS technique.
脑机接口(BCI)将提供实时通信,有针对性地完善寿命标准,大脑到互联网(B2I)连接,以及外部数字设备与大脑之间的交互。这种辅助技术发明了信息和传输的先进模式,比如将大脑和多媒体设备直接连接到网络世界。该系统将大脑数据转换为多媒体设备可以理解的信号,无需物理干预,并与外部大气控制协议交换人类相关语言。这些逐渐出现的困难将严重限制安全。因此,勒索软件、攻击、恶意软件和其他类型漏洞的发生率将急剧上升。另一方面,有必要加强调查网络环境安全方面的传统流程。本文提出了一种基于集中式区块链入侵系统(NDDCBI-CBIS)的计算机脑接口神经系统疾病检测方法。预计的nddcbbi - cbis技术侧重于神经系统疾病的识别和癫痫发作的检测。为此,提出了NDDCBI-CBIS技术对生物医学信号进行预处理。其次,应用长短期记忆(LSTM)模型检测癫痫发作。利用医学数据集和NDDCBI-CBIS技术增强结果推断的结果,可以对NDDCBI-CBIS方法的实验评估进行测试。
{"title":"Neurological Disorders Detection Based on Computer Brain Interface Using Centralized Blockchain with Intrusion System","authors":"I. Yuwono, Eviani Damastuti Utomo","doi":"10.17762/ijcnis.v14i2.5498","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5498","url":null,"abstract":"A brain-computer interface (BCI) would afford real-time communication, pointedly refining the standard of lifespan, brain-to-internet (B2I) connection, and interaction between the external digital devices and the brain. This assistive technology invents information and transmission advancement patterns, like directly linking the brain and multimedia gadgets to the cyber world. This system will convert brain data to signals which is understandable by multimedia gadgets without physical intervention and exchanges human-related languages with external atmosphere control protocols. These progressive difficulties would limit security severely. Hence, the rate of ransomware, attacks, malware, and other types of vulnerabilities will be rising radically. On the other hand, the necessity to enhance conventional processes for investigating cyberenvironment security facets. This article presents a Neurological Disorders Detection based on Computer Brain Interface Using Centralized Blockchain with Intrusion System (NDDCBI-CBIS). The projected NDDCBI-CBIS technique focuses on the identification of neurological disorders and epileptic seizure detection. To attain this, the presented NDDCBI-CBIS technique pre-processes the biomedical signals. Next, to detect epileptic seizures, long short-term memory (LSTM) model is applied. The experimental evaluation of the NDDCBI-CBIS approach can be tested by making use of the medical dataset and the outcomes inferred from the enhanced outcomes of the NDDCBI-CBIS technique.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121754014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Exploration of Uncertain RF MEMS Switch Design with Uniform Meanders 均匀弯曲不确定射频MEMS开关设计的性能探讨
Pub Date : 2022-08-31 DOI: 10.17762/ijcnis.v14i2.5480
C. Mohan, K. S. Kumar, K. Kavya
The design of RF-MEMS Switch is useful for future artificial intelligence applications. Radio detection and range estimation has been employed with RF MEMS technology. Attenuators, limiters, phase shifters, T/R switches, and adjustable matching networks are components of RF MEMS. The proposed RF MEMS technology has been introduced in T/R modules, lenses, reflect arrays, sub arrays and switching beam formers. The uncertain RF MEMS switches have been faced many issues like switching and voltage alterations. This study aims in the direction of design, simulation, model along with RF MEMS switching analysis including consistent curving or meandering. The proposed RF MEMS Switch is a flexure form of the Meanders that attain minimal power in nominal voltage. Moreover, this research work highlights the materials assortment in case of beam along with signal-based dielectric. The performance analysis is demonstrated for various materials that have been utilized in the design purpose. Further, better isolation is accomplished at the range of -31dB necessary regarding 8.06V pull-in voltage through a spring constant valued at 3.588N/m, switching capacitance analysis has been found to be 103 fF at ON state and 7.03pF at OFF state and the proposed switch is optimized to work at 38GHz. The designed RF MEMS switch is giving 30% voltage improvement; switching frequency is improved by 21.32% had been attained, which are outperformance the methodology and compete with present technology.
RF-MEMS开关的设计对未来的人工智能应用具有重要意义。射频MEMS技术已被用于无线电探测和距离估计。衰减器、限制器、移相器、T/R开关和可调匹配网络是RF MEMS的组成部分。提出的射频MEMS技术已被引入到T/R模块、透镜、反射阵列、子阵列和开关波束形成器中。不确定射频MEMS开关面临着许多问题,如开关和电压变化。本研究的方向是设计、仿真、建模以及射频MEMS开关分析,包括一致曲线或蜿蜒。所提出的RF MEMS开关是弯曲形式的曲式,在标称电压下达到最小功率。此外,本研究还强调了波束和基于信号的介质情况下的材料组合。性能分析演示了在设计目的中使用的各种材料。此外,在8.06V的拉入电压下,通过3.588N/m的弹簧常数在-31dB的范围内实现了更好的隔离,开关电容分析发现在ON状态下为103 fF,在OFF状态下为7.03pF,并且所提出的开关被优化为工作在38GHz。所设计的射频MEMS开关电压提高30%;实验结果表明,该方法的开关频率提高了21.32%,与现有技术相比,具有明显的优势。
{"title":"Performance Exploration of Uncertain RF MEMS Switch Design with Uniform Meanders","authors":"C. Mohan, K. S. Kumar, K. Kavya","doi":"10.17762/ijcnis.v14i2.5480","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5480","url":null,"abstract":"The design of RF-MEMS Switch is useful for future artificial intelligence applications. Radio detection and range estimation has been employed with RF MEMS technology. Attenuators, limiters, phase shifters, T/R switches, and adjustable matching networks are components of RF MEMS. The proposed RF MEMS technology has been introduced in T/R modules, lenses, reflect arrays, sub arrays and switching beam formers. The uncertain RF MEMS switches have been faced many issues like switching and voltage alterations. This study aims in the direction of design, simulation, model along with RF MEMS switching analysis including consistent curving or meandering. The proposed RF MEMS Switch is a flexure form of the Meanders that attain minimal power in nominal voltage. Moreover, this research work highlights the materials assortment in case of beam along with signal-based dielectric. The performance analysis is demonstrated for various materials that have been utilized in the design purpose. Further, better isolation is accomplished at the range of -31dB necessary regarding 8.06V pull-in voltage through a spring constant valued at 3.588N/m, switching capacitance analysis has been found to be 103 fF at ON state and 7.03pF at OFF state and the proposed switch is optimized to work at 38GHz. The designed RF MEMS switch is giving 30% voltage improvement; switching frequency is improved by 21.32% had been attained, which are outperformance the methodology and compete with present technology.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124283859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive And Reliable GPS Uncertain Position Estimation an Insightful Oceanography and Geography Applications 自适应可靠的GPS不确定位置估计在海洋学和地理学中的应用
Pub Date : 2022-08-31 DOI: 10.17762/ijcnis.v14i2.5481
K. U. Kiran, K. Ramesh, S. Rao
Location evaluation applications are one of the most imperative services in GPS position applications. The Global Positioning Systems (GPS) is a versatile and legacy technology has been providing a reliable and accurate position of objects on Earth. The uncertain GPS position is considered an initialization parameter for many inherent systems in today’s world. This initialization position estimate has a wide variety of applications such as Coast line maps, understanding the geo-dynamical phenomena such as volcanic eruptions, earthquakes and subsequent originating source mechanisms, Mean Sea level estimation for contours of land surfaces, Oceanic en-route as well as in mobile and Vehicular technologies etc. The validation and reliability of the results of all those applications is dependent on the accuracy of the position estimate given by GPS. In this work an attempt is made to retrieve accurate and reliable position parameters from GPS by correcting the measurement errors for all the visible satellites at every epoch. The maximum and minimum pseudo ranges in L2 signal observed are 2437404.2 meters and -76295.22 meters.
定位评估应用是GPS定位应用中最重要的服务之一。全球定位系统(GPS)是一项多功能的传统技术,一直在为地球上的物体提供可靠和准确的位置。GPS位置的不确定性被认为是当今世界许多固有系统的初始化参数。这种初始位置估计有各种各样的应用,如海岸线地图,了解地球动力学现象,如火山爆发,地震和随后的起源源机制,平均海平面估计的轮廓的陆地表面,海洋在途中以及在移动和车辆技术等。所有这些应用结果的验证和可靠性取决于GPS给出的位置估计的准确性。本文试图通过校正所有可见光卫星在每个历元的测量误差,从GPS中检索出准确可靠的位置参数。观测到的L2信号伪距离最大值2437404.2米,最小值-76295.22米。
{"title":"Adaptive And Reliable GPS Uncertain Position Estimation an Insightful Oceanography and Geography Applications","authors":"K. U. Kiran, K. Ramesh, S. Rao","doi":"10.17762/ijcnis.v14i2.5481","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5481","url":null,"abstract":"Location evaluation applications are one of the most imperative services in GPS position applications. The Global Positioning Systems (GPS) is a versatile and legacy technology has been providing a reliable and accurate position of objects on Earth. The uncertain GPS position is considered an initialization parameter for many inherent systems in today’s world. This initialization position estimate has a wide variety of applications such as Coast line maps, understanding the geo-dynamical phenomena such as volcanic eruptions, earthquakes and subsequent originating source mechanisms, Mean Sea level estimation for contours of land surfaces, Oceanic en-route as well as in mobile and Vehicular technologies etc. The validation and reliability of the results of all those applications is dependent on the accuracy of the position estimate given by GPS. In this work an attempt is made to retrieve accurate and reliable position parameters from GPS by correcting the measurement errors for all the visible satellites at every epoch. The maximum and minimum pseudo ranges in L2 signal observed are 2437404.2 meters and -76295.22 meters.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134116649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive Based Attention Deficit Hyperactivity Disorder Detection with Ability Assessment Using Auto Encoder Based Hidden Markov Model 基于自动编码器的隐马尔可夫模型的认知型注意缺陷多动障碍检测与能力评估
Pub Date : 2022-08-31 DOI: 10.17762/ijcnis.v14i2.5464
Mahesh T R, Tanmay Goswami, Srinivasan Sriramulu, Neeraj Sharma, Alka Kumari, Ganesh Khekare
Attention deficit hyperactivity disorder (ADHD) is a frequent Neuro-generative mental disorder. It can persist in adulthood and be expressed as a cognitive complaint. Behavioural analysis of ADHD consumes more time. This is a multi-informant complex procedure due to the overlaps in symptomatology which is the cause for delay in diagnosis and treatment. Dur to these behavioural consequences and various causes, no single test is utilized till now for diagnosing this disorder. Hence, a diagnosing model of ADHD based on Continuous Ability Assessment Test (CAAT) can enhance and balance behavioural assessment. The objective behind this study is to use a deep learning based model with CAAT for predicting ADHD. The proposed Auto Encoder Based Hidden Markov Model (AE-HMM) produces low-dimensional features of brain structures, and a novel Pearson Correlation Coefficient (PCC) is employed for normalizing these features in order to minimize batch effects over populations and datasets. This goal is consistently achieved and thus the proposed model outperforms few standard approaches which are considered like CogniLearn and 3-D Convolutional Neural Networks (3DCNN). It is found that the proposed AE-HMM method achieves 93.68% of accuracy, 90.66% of sensitivity, 87.72% of specificity, 87.78% of F1-score and 74.22% of kappa score.
注意缺陷多动障碍(ADHD)是一种常见的神经生成性精神障碍。它可以持续到成年,并表现为一种认知疾病。ADHD的行为分析需要更多的时间。这是一个多信息复杂的程序,由于重叠的症状,这是延误诊断和治疗的原因。由于这些行为后果和各种原因,到目前为止还没有单一的测试用于诊断这种疾病。因此,基于持续能力评估测试(CAAT)的ADHD诊断模型可以增强和平衡行为评估。本研究的目的是使用基于CAAT的深度学习模型来预测ADHD。提出的基于自动编码器的隐马尔可夫模型(AE-HMM)产生大脑结构的低维特征,并采用一种新的Pearson相关系数(PCC)对这些特征进行归一化,以最大限度地减少对总体和数据集的批量影响。这一目标始终如一地实现,因此所提出的模型优于一些标准方法,如cognillearn和3d卷积神经网络(3DCNN)。结果表明,AE-HMM方法准确率为93.68%,灵敏度为90.66%,特异性为87.72%,f1评分为87.78%,kappa评分为74.22%。
{"title":"Cognitive Based Attention Deficit Hyperactivity Disorder Detection with Ability Assessment Using Auto Encoder Based Hidden Markov Model","authors":"Mahesh T R, Tanmay Goswami, Srinivasan Sriramulu, Neeraj Sharma, Alka Kumari, Ganesh Khekare","doi":"10.17762/ijcnis.v14i2.5464","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5464","url":null,"abstract":"Attention deficit hyperactivity disorder (ADHD) is a frequent Neuro-generative mental disorder. It can persist in adulthood and be expressed as a cognitive complaint. Behavioural analysis of ADHD consumes more time. This is a multi-informant complex procedure due to the overlaps in symptomatology which is the cause for delay in diagnosis and treatment. Dur to these behavioural consequences and various causes, no single test is utilized till now for diagnosing this disorder. Hence, a diagnosing model of ADHD based on Continuous Ability Assessment Test (CAAT) can enhance and balance behavioural assessment. The objective behind this study is to use a deep learning based model with CAAT for predicting ADHD. The proposed Auto Encoder Based Hidden Markov Model (AE-HMM) produces low-dimensional features of brain structures, and a novel Pearson Correlation Coefficient (PCC) is employed for normalizing these features in order to minimize batch effects over populations and datasets. This goal is consistently achieved and thus the proposed model outperforms few standard approaches which are considered like CogniLearn and 3-D Convolutional Neural Networks (3DCNN). It is found that the proposed AE-HMM method achieves 93.68% of accuracy, 90.66% of sensitivity, 87.72% of specificity, 87.78% of F1-score and 74.22% of kappa score.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123209654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Int. J. Commun. Networks Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1