首页 > 最新文献

Engineering, Technology & Applied Science Research最新文献

英文 中文
Parameter Estimation of Photovoltaic Cell using Transit Search Optimizer 利用遍历搜索优化器估算光伏电池参数
Pub Date : 2024-06-01 DOI: 10.48084/etasr.6956
Hady El Said Abdel Maksoud, Shaaban M. Shaaban
In the evaluation of a Photovoltaic (PV) system's performance, precise calculation of the system's parameters is essential, as these parameters significantly influence its efficiency across various sunlight intensities, temperature ranges, and distinct load conditions. Addressing the intricate non-linear optimization problem of pinpointing these PV system parameters, the current research adopts a novel metaheuristic optimization approach, called Transit Search (TS). The proposed technique was rigorously tested on a monocrystalline solar panel, which included both single and double-diode model structures. The design of the objective function within this framework aims to diminish the square root of the average squared discrepancies between theoretical and measured current outputs, while remaining within the established parameter bounds. The proficiency of the TS algorithm was highlighted by employing a variety of statistical error indicators, underlining the latter’s effectiveness. When pitted against other established optimization algorithms through comparative analysis, TS demonstrated outstanding capabilities, evidently outperforming its contemporaries in the accurate determination of PV system parameters.
在评估光伏(PV)系统的性能时,精确计算系统参数至关重要,因为这些参数会在不同的日照强度、温度范围和不同的负载条件下对系统效率产生重大影响。为了解决精确定位这些光伏系统参数这一错综复杂的非线性优化问题,当前的研究采用了一种新颖的元启发式优化方法,即 "过境搜索"(Transit Search,TS)。所提出的技术在单晶硅太阳能电池板上进行了严格测试,包括单二极管和双二极管模型结构。在此框架内设计目标函数的目的是减少理论和测量电流输出之间平均平方差的平方根,同时保持在既定的参数范围内。通过采用各种统计误差指标,凸显了 TS 算法的能力,从而强调了后者的有效性。通过对比分析,在与其他成熟的优化算法进行比较时,TS 表现出了卓越的能力,在准确确定光伏系统参数方面明显优于同时代的其他算法。
{"title":"Parameter Estimation of Photovoltaic Cell using Transit Search Optimizer","authors":"Hady El Said Abdel Maksoud, Shaaban M. Shaaban","doi":"10.48084/etasr.6956","DOIUrl":"https://doi.org/10.48084/etasr.6956","url":null,"abstract":"In the evaluation of a Photovoltaic (PV) system's performance, precise calculation of the system's parameters is essential, as these parameters significantly influence its efficiency across various sunlight intensities, temperature ranges, and distinct load conditions. Addressing the intricate non-linear optimization problem of pinpointing these PV system parameters, the current research adopts a novel metaheuristic optimization approach, called Transit Search (TS). The proposed technique was rigorously tested on a monocrystalline solar panel, which included both single and double-diode model structures. The design of the objective function within this framework aims to diminish the square root of the average squared discrepancies between theoretical and measured current outputs, while remaining within the established parameter bounds. The proficiency of the TS algorithm was highlighted by employing a variety of statistical error indicators, underlining the latter’s effectiveness. When pitted against other established optimization algorithms through comparative analysis, TS demonstrated outstanding capabilities, evidently outperforming its contemporaries in the accurate determination of PV system parameters.","PeriodicalId":364936,"journal":{"name":"Engineering, Technology & Applied Science Research","volume":"68 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141280679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Optimal NLP Solutions: Analyzing GPT and LLaMA-2 Models Across Model Scale, Dataset Size, and Task Diversity 实现最佳 NLP 解决方案:跨模型规模、数据集大小和任务多样性分析 GPT 和 LLaMA-2 模型
Pub Date : 2024-06-01 DOI: 10.48084/etasr.7200
Ankit Kumar, Richa Sharma, Punam Bedi
This study carries out a comprehensive comparison of fine-tuned GPT models (GPT-2, GPT-3, GPT-3.5) and LLaMA-2 models (LLaMA-2 7B, LLaMA-2 13B, LLaMA-2 70B) in text classification, addressing dataset sizes, model scales, and task diversity. Since its inception in 2018, the GPT series has been pivotal in advancing NLP, with each iteration introducing substantial enhancements. Despite its progress, detailed analyses, especially against competitive open-source models like the LLaMA-2 series in text classification, remain scarce. The current study fills this gap by fine-tuning these models across varied datasets, focusing on enhancing task-specific performance in hate speech and offensive language detection, fake news classification, and sentiment analysis. The learning efficacy and efficiency of the GPT and LLaMA-2 models were evaluated, providing a nuanced guide to choosing optimal models for NLP tasks based on architectural benefits and adaptation efficiency with limited data and resources. In particular, even with datasets as small as 1,000 rows per class, the F1 scores for the GPT-3.5 and LLaMA-2 models exceeded 0.9, reaching 0.99 with complete datasets. Additionally, the LLaMA-2 13B and 70B models outperformed GPT-3, demonstrating their superior efficiency and effectiveness in text classification. Both the GPT and LLaMA-2 series showed commendable performance on all three tasks, underscoring their ability to handle a diversity of tasks. Based on the size, performance, and resources required for fine-tuning the model, this study identifies LLaMA-2 13B as the most optimal model for NLP tasks.
本研究针对数据集规模、模型规模和任务多样性,对文本分类中的微调 GPT 模型(GPT-2、GPT-3、GPT-3.5)和 LLaMA-2 模型(LLaMA-2 7B、LLaMA-2 13B、LLaMA-2 70B)进行了全面比较。自 2018 年推出以来,GPT 系列在推进 NLP 方面发挥了举足轻重的作用,每一次迭代都带来了实质性的提升。尽管取得了进步,但详细的分析,尤其是与文本分类中具有竞争力的开源模型(如 LLaMA-2 系列)的对比分析仍然很少。本研究填补了这一空白,在不同的数据集上对这些模型进行了微调,重点提高了仇恨言论和攻击性语言检测、假新闻分类和情感分析等特定任务的性能。研究评估了 GPT 模型和 LLaMA-2 模型的学习效果和效率,为在有限的数据和资源条件下根据架构优势和适应效率为 NLP 任务选择最佳模型提供了细致入微的指导。特别是,即使数据集小到每类 1,000 行,GPT-3.5 和 LLaMA-2 模型的 F1 分数也超过了 0.9,在完整数据集上达到了 0.99。此外,LLaMA-2 13B 和 70B 模型的表现也优于 GPT-3,证明了它们在文本分类方面的卓越效率和有效性。GPT 和 LLaMA-2 系列在所有三个任务中都表现出了值得称道的性能,突显了它们处理各种任务的能力。基于模型的大小、性能和微调所需的资源,本研究认为 LLaMA-2 13B 是 NLP 任务的最佳模型。
{"title":"Towards Optimal NLP Solutions: Analyzing GPT and LLaMA-2 Models Across Model Scale, Dataset Size, and Task Diversity","authors":"Ankit Kumar, Richa Sharma, Punam Bedi","doi":"10.48084/etasr.7200","DOIUrl":"https://doi.org/10.48084/etasr.7200","url":null,"abstract":"This study carries out a comprehensive comparison of fine-tuned GPT models (GPT-2, GPT-3, GPT-3.5) and LLaMA-2 models (LLaMA-2 7B, LLaMA-2 13B, LLaMA-2 70B) in text classification, addressing dataset sizes, model scales, and task diversity. Since its inception in 2018, the GPT series has been pivotal in advancing NLP, with each iteration introducing substantial enhancements. Despite its progress, detailed analyses, especially against competitive open-source models like the LLaMA-2 series in text classification, remain scarce. The current study fills this gap by fine-tuning these models across varied datasets, focusing on enhancing task-specific performance in hate speech and offensive language detection, fake news classification, and sentiment analysis. The learning efficacy and efficiency of the GPT and LLaMA-2 models were evaluated, providing a nuanced guide to choosing optimal models for NLP tasks based on architectural benefits and adaptation efficiency with limited data and resources. In particular, even with datasets as small as 1,000 rows per class, the F1 scores for the GPT-3.5 and LLaMA-2 models exceeded 0.9, reaching 0.99 with complete datasets. Additionally, the LLaMA-2 13B and 70B models outperformed GPT-3, demonstrating their superior efficiency and effectiveness in text classification. Both the GPT and LLaMA-2 series showed commendable performance on all three tasks, underscoring their ability to handle a diversity of tasks. Based on the size, performance, and resources required for fine-tuning the model, this study identifies LLaMA-2 13B as the most optimal model for NLP tasks.","PeriodicalId":364936,"journal":{"name":"Engineering, Technology & Applied Science Research","volume":"131 30","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141281597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing Eye Disease Assessment through Deep Learning: A Comparative Study with Pre-Trained Models 通过深度学习推进眼疾评估:与预训练模型的比较研究
Pub Date : 2024-06-01 DOI: 10.48084/etasr.7294
Zamil S. Alzamil
The significant global challenges in eye care are treatment, preventive quality, rehabilitation services for eye patients, and the shortage of qualified eye care professionals. Early detection and diagnosis of eye diseases could allow vision impairment to be avoided. One barrier to ophthalmologists when adopting computer-aided diagnosis tools is the prevalence of sight-threatening uncommon diseases that are often overlooked. Earlier studies have classified eye diseases into two or a small number of classes, focusing on glaucoma, and diabetes-related and age-related vision issues. This study employed three well-established and publicly available datasets to address these limitations and enable automatic classification of a wide range of eye disorders. A Deep Neural Network for Retinal Fundus Disease Classification (DNNRFDC) model was developed, evaluated based on various performance metrics, and compared with four established pre-trained models (EfficientNetB7, EfficientNetB0, UNet, and ResNet152) utilizing transfer learning techniques. The results showed that the proposed DNNRFDC model outperformed these pre-trained models in terms of overall accuracy across all three datasets, achieving an impressive accuracy of 94.10%. Furthermore, the DNNRFDC model has fewer parameters and lower computational requirements, making it more efficient for real-time applications. This innovative model represents a promising avenue for further advancements in the field of ophthalmological diagnosis and care. Despite these promising results, it is essential to acknowledge the limitations of this study, namely the evaluation conducted by using publicly available datasets that may not fully represent the diversity and complexity of real-world clinical scenarios. Future research could incorporate more diverse datasets and explore the integration of additional diagnostic modalities to further enhance the model's robustness and clinical applicability.
全球眼科护理面临的重大挑战是治疗、预防质量、眼病患者的康复服务以及合格眼科护理专业人员的短缺。及早发现和诊断眼疾可以避免视力受损。眼科医生在采用计算机辅助诊断工具时遇到的一个障碍是,威胁视力的不常见疾病普遍存在,而这些疾病往往被忽视。早期的研究将眼疾分为两类或少数几类,主要集中在青光眼、与糖尿病相关的视力问题和与年龄相关的视力问题。本研究采用了三个成熟的公开数据集来解决这些局限性,并实现了对各种眼部疾病的自动分类。研究人员开发了用于视网膜眼底疾病分类的深度神经网络(DNNRFDC)模型,根据各种性能指标对其进行了评估,并利用迁移学习技术将其与四个成熟的预训练模型(EfficientNetB7、EfficientNetB0、UNet 和 ResNet152)进行了比较。结果表明,在所有三个数据集上,所提出的 DNNRFDC 模型的总体准确率都优于这些预训练模型,达到了令人印象深刻的 94.10%。此外,DNNRFDC 模型的参数更少、计算要求更低,使其在实时应用中更加高效。这一创新模型为眼科诊断和护理领域的进一步发展开辟了一条前景广阔的道路。尽管取得了这些令人鼓舞的成果,但必须承认本研究的局限性,即使用公开数据集进行的评估可能无法完全代表真实世界临床场景的多样性和复杂性。未来的研究可以采用更多样化的数据集,并探索整合更多的诊断模式,以进一步提高模型的稳健性和临床适用性。
{"title":"Advancing Eye Disease Assessment through Deep Learning: A Comparative Study with Pre-Trained Models","authors":"Zamil S. Alzamil","doi":"10.48084/etasr.7294","DOIUrl":"https://doi.org/10.48084/etasr.7294","url":null,"abstract":"The significant global challenges in eye care are treatment, preventive quality, rehabilitation services for eye patients, and the shortage of qualified eye care professionals. Early detection and diagnosis of eye diseases could allow vision impairment to be avoided. One barrier to ophthalmologists when adopting computer-aided diagnosis tools is the prevalence of sight-threatening uncommon diseases that are often overlooked. Earlier studies have classified eye diseases into two or a small number of classes, focusing on glaucoma, and diabetes-related and age-related vision issues. This study employed three well-established and publicly available datasets to address these limitations and enable automatic classification of a wide range of eye disorders. A Deep Neural Network for Retinal Fundus Disease Classification (DNNRFDC) model was developed, evaluated based on various performance metrics, and compared with four established pre-trained models (EfficientNetB7, EfficientNetB0, UNet, and ResNet152) utilizing transfer learning techniques. The results showed that the proposed DNNRFDC model outperformed these pre-trained models in terms of overall accuracy across all three datasets, achieving an impressive accuracy of 94.10%. Furthermore, the DNNRFDC model has fewer parameters and lower computational requirements, making it more efficient for real-time applications. This innovative model represents a promising avenue for further advancements in the field of ophthalmological diagnosis and care. Despite these promising results, it is essential to acknowledge the limitations of this study, namely the evaluation conducted by using publicly available datasets that may not fully represent the diversity and complexity of real-world clinical scenarios. Future research could incorporate more diverse datasets and explore the integration of additional diagnostic modalities to further enhance the model's robustness and clinical applicability.","PeriodicalId":364936,"journal":{"name":"Engineering, Technology & Applied Science Research","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141274321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
G-GANS for Adaptive Learning in Dynamic Network Slices 动态网络切片中的自适应学习 G-GANS
Pub Date : 2024-06-01 DOI: 10.48084/etasr.7046
M. Alanazi
This paper introduces a novel approach to improve security in dynamic network slices for 5G networks using Graph-based Generative Adversarial Networks (G-GAN). Given the rapidly evolving and adaptable nature of 5G network slices, traditional security mechanisms often fall short in providing real-time, efficient, and scalable defense mechanisms. To address this gap, this study proposes the use of G-GAN, which combines the strengths of Generative Adversarial Networks (GANs) and Graph Neural Networks (GNNs) for adaptive learning and anomaly detection in dynamic network environments. The proposed approach utilizes GAN to generate realistic network traffic patterns, both normal and adversarial, whereas GNNs analyze these patterns within the context of the network's graph-based topology. This combination facilitates the early detection of anomalies and potential security threats, adapting to the ever-changing configurations of network slices. The current study presents a comprehensive methodology for implementing G-GAN, including system architecture, data processing, and model training. The experimental analysis demonstrates the efficacy of G-GAN in accurately identifying security threats and adapting to new scenarios, revealing that G-GAN outperformed established models with an accuracy of 97.12%, precision of 96.20%, recall of 97.24%, and F1-Score of 96.72%. This study not only contributes to the field of network security in the context of 5G, but also opens avenues for future exploration in the application of hybrid AI models for real-time security across various domains.
本文介绍了一种利用基于图形的生成对抗网络(G-GAN)提高 5G 网络动态网络切片安全性的新方法。鉴于 5G 网络切片的快速发展和适应性,传统的安全机制往往无法提供实时、高效和可扩展的防御机制。针对这一不足,本研究提出使用 G-GAN,它结合了生成对抗网络(GAN)和图神经网络(GNN)的优势,用于动态网络环境中的自适应学习和异常检测。所提出的方法利用 GAN 生成真实的网络流量模式,包括正常模式和对抗模式,而 GNN 则在基于图的网络拓扑背景下分析这些模式。这种组合有助于及早发现异常和潜在的安全威胁,适应不断变化的网络切片配置。本研究介绍了实施 G-GAN 的综合方法,包括系统架构、数据处理和模型训练。实验分析表明了 G-GAN 在准确识别安全威胁和适应新场景方面的功效,G-GAN 的准确率为 97.12%,精确率为 96.20%,召回率为 97.24%,F1-Score 为 96.72%,均优于既有模型。这项研究不仅为 5G 背景下的网络安全领域做出了贡献,还为未来探索混合人工智能模型在各个领域的实时安全应用开辟了道路。
{"title":"G-GANS for Adaptive Learning in Dynamic Network Slices","authors":"M. Alanazi","doi":"10.48084/etasr.7046","DOIUrl":"https://doi.org/10.48084/etasr.7046","url":null,"abstract":"This paper introduces a novel approach to improve security in dynamic network slices for 5G networks using Graph-based Generative Adversarial Networks (G-GAN). Given the rapidly evolving and adaptable nature of 5G network slices, traditional security mechanisms often fall short in providing real-time, efficient, and scalable defense mechanisms. To address this gap, this study proposes the use of G-GAN, which combines the strengths of Generative Adversarial Networks (GANs) and Graph Neural Networks (GNNs) for adaptive learning and anomaly detection in dynamic network environments. The proposed approach utilizes GAN to generate realistic network traffic patterns, both normal and adversarial, whereas GNNs analyze these patterns within the context of the network's graph-based topology. This combination facilitates the early detection of anomalies and potential security threats, adapting to the ever-changing configurations of network slices. The current study presents a comprehensive methodology for implementing G-GAN, including system architecture, data processing, and model training. The experimental analysis demonstrates the efficacy of G-GAN in accurately identifying security threats and adapting to new scenarios, revealing that G-GAN outperformed established models with an accuracy of 97.12%, precision of 96.20%, recall of 97.24%, and F1-Score of 96.72%. This study not only contributes to the field of network security in the context of 5G, but also opens avenues for future exploration in the application of hybrid AI models for real-time security across various domains.","PeriodicalId":364936,"journal":{"name":"Engineering, Technology & Applied Science Research","volume":"66 43","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141276537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of the PM-EDM Process Parameters for Ti-35Nb-7Zr-5Ta Bio Alloy 优化 Ti-35Nb-7Zr-5Ta 生物合金的 PM-EDM 工艺参数
Pub Date : 2024-06-01 DOI: 10.48084/etasr.6845
A. R. Hayyawi, H. Al-Ethari, A. H. Haleem
Powder-Mixed Electrical Discharge Machining (PM-EDM) is one of the latest advancements in EDM process capability augmentation. This procedure involves effectively mixing a suitable material in fine powder form with the dielectric fluid. The dielectric fluid's breakdown properties are enhanced by the additional powder. The objective of the present research is to machine the Ti-35Nb-7Zr-5Ta alloy prepared by powder metallurgy and study the influence of process parameters, such as peak current, pulse-on time, pulse-off time, powder type (Ag, Si, Ag+Si), and powder concentration. The metal removal rate and SR represent the response parameters. The Taguchi approach was followed to design the experiments. The five-factor three-level design was chosen to use the Taguchi L27 orthogonal array. It was found that the addition of Ag, Si, or Ag+Si powders to the dielectric fluid enhanced the metal removal rate and the surface finish for this alloy. The addition of Ag powder to the dielectric fluid gave a higher Material Removal Rate (MRR) and a lower SR compared to Si or Ag+Si powders. Powder concentration and pulse current are the most effective parameters on MRR and SR followed by powder type, pulse-on, and pulse-off. The maximum Grey Relational Grade (GRG) exists at (I=5 A, Ton=9 µs, Toff=37 µs, PT=Ag, PC=20 g/L). These are the optimal conditions for PM-EDM of the Ti-35Nb-7Zr-5Ta alloy that give maximum MRR with minimum SR.
粉末混合放电加工(PM-EDM)是放电加工工艺能力增强的最新进展之一。这种方法是将适当的细粉末状材料与电介质有效混合。额外的粉末增强了介电流体的击穿特性。本研究旨在加工粉末冶金法制备的 Ti-35Nb-7Zr-5Ta 合金,并研究峰值电流、脉冲开启时间、脉冲关闭时间、粉末类型(Ag、Si、Ag+Si)和粉末浓度等工艺参数的影响。金属去除率和 SR 代表响应参数。实验设计采用田口方法。采用 Taguchi L27 正交阵列进行五因素三级设计。实验发现,在电介质中添加 Ag、Si 或 Ag+Si 粉末可提高该合金的金属去除率和表面光洁度。与硅粉或 Ag+Si 粉相比,在介电流体中添加 Ag 粉可获得更高的材料去除率 (MRR)和更低的 SR。粉末浓度和脉冲电流是对 MRR 和 SR 最有效的参数,其次是粉末类型、脉冲开启和脉冲关闭。在(I=5 A,Ton=9 µs,Toff=37 µs,PT=Ag,PC=20 g/L)时,灰色关系等级(GRG)最大。这些都是 Ti-35Nb-7Zr-5Ta 合金 PM-EDM 的最佳条件,能以最小的 SR 获得最大的 MRR。
{"title":"Optimization of the PM-EDM Process Parameters for Ti-35Nb-7Zr-5Ta Bio Alloy","authors":"A. R. Hayyawi, H. Al-Ethari, A. H. Haleem","doi":"10.48084/etasr.6845","DOIUrl":"https://doi.org/10.48084/etasr.6845","url":null,"abstract":"Powder-Mixed Electrical Discharge Machining (PM-EDM) is one of the latest advancements in EDM process capability augmentation. This procedure involves effectively mixing a suitable material in fine powder form with the dielectric fluid. The dielectric fluid's breakdown properties are enhanced by the additional powder. The objective of the present research is to machine the Ti-35Nb-7Zr-5Ta alloy prepared by powder metallurgy and study the influence of process parameters, such as peak current, pulse-on time, pulse-off time, powder type (Ag, Si, Ag+Si), and powder concentration. The metal removal rate and SR represent the response parameters. The Taguchi approach was followed to design the experiments. The five-factor three-level design was chosen to use the Taguchi L27 orthogonal array. It was found that the addition of Ag, Si, or Ag+Si powders to the dielectric fluid enhanced the metal removal rate and the surface finish for this alloy. The addition of Ag powder to the dielectric fluid gave a higher Material Removal Rate (MRR) and a lower SR compared to Si or Ag+Si powders. Powder concentration and pulse current are the most effective parameters on MRR and SR followed by powder type, pulse-on, and pulse-off. The maximum Grey Relational Grade (GRG) exists at (I=5 A, Ton=9 µs, Toff=37 µs, PT=Ag, PC=20 g/L). These are the optimal conditions for PM-EDM of the Ti-35Nb-7Zr-5Ta alloy that give maximum MRR with minimum SR.","PeriodicalId":364936,"journal":{"name":"Engineering, Technology & Applied Science Research","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141279007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Topology Optimization Design for Additive Manufacturing 增材制造拓扑优化设计研究
Pub Date : 2024-06-01 DOI: 10.48084/etasr.7220
Nguyen Thi Anh, Nguyen Xuan Quynh, Trần Thanh Tùng
Topology optimization is an advanced technique for structural optimization that aims to achieve an optimally efficient structure by redistribution materials while ensuring fulfillment of load-carrying, performance, and initial boundary. One of the obstacles in the process of optimizing structures for mechanical parts is that these optimized structures sometimes encounter difficulties during the manufacturing process. Additive Manufacturing (AM), also known as 3D printing technology, is a method of manufacturing machine parts through joining layers of material. AM opens up the possibility of fabricating complex structures, especially for structures that have been subjected to topology optimization techniques. This project aims to compare the initial shape of a box under static load and its shape after optimization. The subsequent produced models have reduced weights of 43%, 59%, 70%, 73%, and 77%, respectively, weighing 491.45 g, 357.42 g, 261.31 g, 235.56 g, and 203.87 g. All models are capable of supporting a 10 kg load, demonstrating the ability of the structure to meet technical specifications. The results show that combining structural optimization and additive manufacturing can take advantage of both approaches and show significant potential for modern manufacturing.
拓扑优化是一种先进的结构优化技术,其目的是通过重新分配材料,在确保满足承载、性能和初始边界的前提下,获得最佳的高效结构。机械零件结构优化过程中的一个障碍是,这些优化结构在制造过程中有时会遇到困难。增材制造(AM)又称三维打印技术,是一种通过连接材料层来制造机械零件的方法。AM 为复杂结构的制造提供了可能,尤其是对于经过拓扑优化技术处理的结构。本项目旨在比较箱体在静态负载下的初始形状和优化后的形状。随后制作的模型重量分别减轻了 43%、59%、70%、73% 和 77%,重量分别为 491.45 克、357.42 克、261.31 克、235.56 克和 203.87 克。结果表明,将结构优化和快速成型制造结合起来,可以发挥两种方法的优势,并显示出现代制造的巨大潜力。
{"title":"Study on Topology Optimization Design for Additive Manufacturing","authors":"Nguyen Thi Anh, Nguyen Xuan Quynh, Trần Thanh Tùng","doi":"10.48084/etasr.7220","DOIUrl":"https://doi.org/10.48084/etasr.7220","url":null,"abstract":"Topology optimization is an advanced technique for structural optimization that aims to achieve an optimally efficient structure by redistribution materials while ensuring fulfillment of load-carrying, performance, and initial boundary. One of the obstacles in the process of optimizing structures for mechanical parts is that these optimized structures sometimes encounter difficulties during the manufacturing process. Additive Manufacturing (AM), also known as 3D printing technology, is a method of manufacturing machine parts through joining layers of material. AM opens up the possibility of fabricating complex structures, especially for structures that have been subjected to topology optimization techniques. This project aims to compare the initial shape of a box under static load and its shape after optimization. The subsequent produced models have reduced weights of 43%, 59%, 70%, 73%, and 77%, respectively, weighing 491.45 g, 357.42 g, 261.31 g, 235.56 g, and 203.87 g. All models are capable of supporting a 10 kg load, demonstrating the ability of the structure to meet technical specifications. The results show that combining structural optimization and additive manufacturing can take advantage of both approaches and show significant potential for modern manufacturing.","PeriodicalId":364936,"journal":{"name":"Engineering, Technology & Applied Science Research","volume":"25 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141279081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust and Secure Routing Protocol Based on Group Key Management for Internet of Things Systems 基于物联网系统群组密钥管理的稳健安全路由协议
Pub Date : 2024-06-01 DOI: 10.48084/etasr.7115
Salwa Othmen, Wahida Mansouri, S. Asklany
The Internet of Things (IoT) has significantly altered our way of life, being integrated into many application types. These applications require a certain level of security, which is always a top priority when offering various services. It is particularly difficult to protect the information produced by IoT devices from security threats and protect the exchanged data as they pass through various nodes and gateways. Group Key Management (GKM) is an essential method for controlling the deployment of keys for network access and safe data delivery in such dynamic situations. However, the huge volume of IoT devices and the growing subscriber base present a scalability difficulty that is not addressed by the current IoT authentication techniques based on GKM. Moreover, all GKM models currently in use enable the independence of participants. They only concentrate on dependent symmetrical group keys for each subgroup, which is ineffective for subscriptions with very dynamic behavior. To address these issues, this study proposes a unique Decentralized Lightweight Group Key Management (DLGKM) framework integrated with a Reliable and Secure Multicast Routing Protocol (REMI-DLGKM), which is a reliable and efficient multicast routing system for IoT networks. REMI-DLGKM is a cluster-based routing protocol that qualifies for faster multiplex message distribution within the system. According to simulation results, this protocol is more effective than cutting-edge protocols in terms of end-to-end delay, energy consumption, and packet delivery ratio. The packet delivery ratio of REMI-DLGKM was 99.21%, which is 4.395 higher than other methods, such as SRPL, QMR, and MAODV. The proposed routing protocol can reduce energy consumption in IoT devices by employing effective key management strategies.
物联网(IoT)已极大地改变了我们的生活方式,并被集成到许多应用类型中。这些应用需要一定程度的安全性,这在提供各种服务时始终是重中之重。要保护物联网设备产生的信息免受安全威胁,并在数据通过各种节点和网关时保护交换的数据,尤其困难。群组密钥管理(GKM)是在这种动态情况下控制网络访问和安全数据传输密钥部署的重要方法。然而,物联网设备数量庞大,用户群不断扩大,这给可扩展性带来了困难,而目前基于 GKM 的物联网身份验证技术却无法解决这一问题。此外,目前使用的所有 GKM 模型都能实现参与者的独立性。它们只专注于每个子组的依赖性对称组密钥,这对于具有非常动态行为的订阅来说是无效的。为了解决这些问题,本研究提出了一种独特的去中心化轻量级组密钥管理(DLGKM)框架,该框架与可靠安全的组播路由协议(REMI-DLGKM)集成,是一种适用于物联网网络的可靠高效的组播路由系统。REMI-DLGKM 是一种基于集群的路由协议,可在系统内实现更快的多路信息分发。根据仿真结果,该协议在端到端延迟、能耗和数据包交付率方面都比前沿协议更有效。REMI-DLGKM 的数据包投递率为 99.21%,比 SRPL、QMR 和 MAODV 等其他方法高出 4.395。通过采用有效的密钥管理策略,所提出的路由协议可以降低物联网设备的能耗。
{"title":"Robust and Secure Routing Protocol Based on Group Key Management for Internet of Things Systems","authors":"Salwa Othmen, Wahida Mansouri, S. Asklany","doi":"10.48084/etasr.7115","DOIUrl":"https://doi.org/10.48084/etasr.7115","url":null,"abstract":"The Internet of Things (IoT) has significantly altered our way of life, being integrated into many application types. These applications require a certain level of security, which is always a top priority when offering various services. It is particularly difficult to protect the information produced by IoT devices from security threats and protect the exchanged data as they pass through various nodes and gateways. Group Key Management (GKM) is an essential method for controlling the deployment of keys for network access and safe data delivery in such dynamic situations. However, the huge volume of IoT devices and the growing subscriber base present a scalability difficulty that is not addressed by the current IoT authentication techniques based on GKM. Moreover, all GKM models currently in use enable the independence of participants. They only concentrate on dependent symmetrical group keys for each subgroup, which is ineffective for subscriptions with very dynamic behavior. To address these issues, this study proposes a unique Decentralized Lightweight Group Key Management (DLGKM) framework integrated with a Reliable and Secure Multicast Routing Protocol (REMI-DLGKM), which is a reliable and efficient multicast routing system for IoT networks. REMI-DLGKM is a cluster-based routing protocol that qualifies for faster multiplex message distribution within the system. According to simulation results, this protocol is more effective than cutting-edge protocols in terms of end-to-end delay, energy consumption, and packet delivery ratio. The packet delivery ratio of REMI-DLGKM was 99.21%, which is 4.395 higher than other methods, such as SRPL, QMR, and MAODV. The proposed routing protocol can reduce energy consumption in IoT devices by employing effective key management strategies.","PeriodicalId":364936,"journal":{"name":"Engineering, Technology & Applied Science Research","volume":"1 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141279427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Efficient and Reliable Routing for Real-time Communication in Wireless Sensor Networks 无线传感器网络实时通信的高能效和可靠路由选择
Pub Date : 2024-06-01 DOI: 10.48084/etasr.7057
Fatma H. El-Fouly, M. Kachout, R. Ramadan, Abdullah J. Alzahrani, J. Alshudukhi, Ibrahim Mohammed Alseadoon
Wireless Sensor Networks (WSN) can be part of a tremendous number of applications. Many WSN applications require real-time communication where the sensed data have to be delivered to the sink node within a predetermined deadline decided by the application. In WSNs, the sensor nodes' constrained resources (e.g. memory and power) and the lossy wireless links, give rise to significant difficulties in supporting real-time applications. In addition, many WSN routing algorithms strongly emphasize energy efficiency, while delay is not the primary concern. Thus, WSNs desperately need new routing protocols that are reliable, energy-efficient, and appropriate for real-time applications. The proposed algorithm is a real-time routing algorithm appropriate for delay-sensitive applications in WSNs. It has the ability to deliver data on time while also enabling communications that are reliable and energy-efficient. It achieves this by deciding which candidate neighbors are eligible to participate in the routing process and can deliver the packet before its deadline. In order to lessen the delay of the chosen paths, it also computes the relaying speed for each eligible candidate. Moreover, it takes into account link quality, hop count, and available buffer size of the selected relays, which leads to end-to-end delay reduction while also minimizing energy consumption. Finally, it considers the node's energy consumption rate when selecting the next forwarder to extend the network lifetime. Through simulation experiments, the proposed algorithm has shown improved performance in terms of packet delivery ratio, network lifetime packets miss ratio, average end-to-end delay, and energy imbalance factor.
无线传感器网络(WSN)可以成为大量应用的一部分。许多 WSN 应用需要实时通信,即必须在应用确定的预定期限内将传感数据传送到汇节点。在 WSN 中,传感器节点有限的资源(如内存和功率)以及有损无线链路给支持实时应用带来了巨大困难。此外,许多 WSN 路由算法都非常强调能效,而延迟并不是主要考虑因素。因此,WSN 迫切需要可靠、节能、适合实时应用的新路由协议。所提出的算法是一种适合 WSN 中对延迟敏感的应用的实时路由算法。它既能及时传送数据,又能实现可靠、节能的通信。它通过决定哪些候选邻居有资格参与路由过程,并能在截止日期前交付数据包来实现这一目标。为了减少所选路径的延迟,它还会计算每个合格候选路径的中继速度。此外,它还会考虑链路质量、跳数和所选中继站的可用缓冲区大小,从而在减少端到端延迟的同时,最大限度地降低能耗。最后,它在选择下一个转发器时考虑了节点的能耗率,以延长网络寿命。通过仿真实验,所提出的算法在数据包递送率、网络生命周期数据包遗漏率、平均端到端延迟和能量不平衡因子等方面都显示出了更好的性能。
{"title":"Energy-Efficient and Reliable Routing for Real-time Communication in Wireless Sensor Networks","authors":"Fatma H. El-Fouly, M. Kachout, R. Ramadan, Abdullah J. Alzahrani, J. Alshudukhi, Ibrahim Mohammed Alseadoon","doi":"10.48084/etasr.7057","DOIUrl":"https://doi.org/10.48084/etasr.7057","url":null,"abstract":"Wireless Sensor Networks (WSN) can be part of a tremendous number of applications. Many WSN applications require real-time communication where the sensed data have to be delivered to the sink node within a predetermined deadline decided by the application. In WSNs, the sensor nodes' constrained resources (e.g. memory and power) and the lossy wireless links, give rise to significant difficulties in supporting real-time applications. In addition, many WSN routing algorithms strongly emphasize energy efficiency, while delay is not the primary concern. Thus, WSNs desperately need new routing protocols that are reliable, energy-efficient, and appropriate for real-time applications. The proposed algorithm is a real-time routing algorithm appropriate for delay-sensitive applications in WSNs. It has the ability to deliver data on time while also enabling communications that are reliable and energy-efficient. It achieves this by deciding which candidate neighbors are eligible to participate in the routing process and can deliver the packet before its deadline. In order to lessen the delay of the chosen paths, it also computes the relaying speed for each eligible candidate. Moreover, it takes into account link quality, hop count, and available buffer size of the selected relays, which leads to end-to-end delay reduction while also minimizing energy consumption. Finally, it considers the node's energy consumption rate when selecting the next forwarder to extend the network lifetime. Through simulation experiments, the proposed algorithm has shown improved performance in terms of packet delivery ratio, network lifetime packets miss ratio, average end-to-end delay, and energy imbalance factor.","PeriodicalId":364936,"journal":{"name":"Engineering, Technology & Applied Science Research","volume":"35 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141280189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metaheuristic Optimization of Maximum Power Point Tracking in PV Array under Partial Shading 部分遮光条件下光伏阵列最大功率点跟踪的元追求优化
Pub Date : 2024-06-01 DOI: 10.48084/etasr.7385
Mohammed Qasim Taha, Mohammed Kareem Mohammed, Bamba El Haiba
Optimal energy harvesting is dependent on the efficient extraction of energy from photovoltaic (PV) arrays. Maximum Power Point Tracking (MPPT) algorithms are crucial in achieving the maximum power harvest from the PV systems. Therefore, in response to a fluctuating power generation rate due to shading of the PV, the MPPT algorithms must dynamically adapt to the PV array's Maximum Power Point (MPP). In this article, three metaheuristic optimization MPPT techniques, utilized in DC converters connected to the array of 4 PV panels, are compared. The Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Ant Colony Optimization (ACO), which are used to optimize MPPT in the converter, are compared. This research evaluates the efficiency of each optimization method in converging to MPP under 2 s after partial shading of the PV with respect to velocity and accuracy. All algorithms exhibit fast MPPT optimization. However, among the evaluated algorithms, the PSO was distinguished for its higher stability and efficiency.
最佳的能源采集取决于从光伏(PV)阵列中有效提取能量。最大功率点跟踪(MPPT)算法是光伏系统实现最大功率采集的关键。因此,为了应对光伏遮挡导致的发电率波动,MPPT 算法必须动态适应光伏阵列的最大功率点 (MPP)。本文对三种元启发式优化 MPPT 技术进行了比较,这些技术用于连接 4 个光伏电池板阵列的直流转换器。比较了用于优化转换器 MPPT 的粒子群优化 (PSO)、遗传算法 (GA) 和蚁群优化 (ACO)。本研究评估了每种优化方法在光伏部分遮光后 2 秒内收敛到 MPP 的速度和精度的效率。所有算法都表现出快速的 MPPT 优化。不过,在评估的算法中,PSO 因其更高的稳定性和效率而脱颖而出。
{"title":"Metaheuristic Optimization of Maximum Power Point Tracking in PV Array under Partial Shading","authors":"Mohammed Qasim Taha, Mohammed Kareem Mohammed, Bamba El Haiba","doi":"10.48084/etasr.7385","DOIUrl":"https://doi.org/10.48084/etasr.7385","url":null,"abstract":"Optimal energy harvesting is dependent on the efficient extraction of energy from photovoltaic (PV) arrays. Maximum Power Point Tracking (MPPT) algorithms are crucial in achieving the maximum power harvest from the PV systems. Therefore, in response to a fluctuating power generation rate due to shading of the PV, the MPPT algorithms must dynamically adapt to the PV array's Maximum Power Point (MPP). In this article, three metaheuristic optimization MPPT techniques, utilized in DC converters connected to the array of 4 PV panels, are compared. The Particle Swarm Optimization (PSO), Genetic Algorithm (GA), and Ant Colony Optimization (ACO), which are used to optimize MPPT in the converter, are compared. This research evaluates the efficiency of each optimization method in converging to MPP under 2 s after partial shading of the PV with respect to velocity and accuracy. All algorithms exhibit fast MPPT optimization. However, among the evaluated algorithms, the PSO was distinguished for its higher stability and efficiency.","PeriodicalId":364936,"journal":{"name":"Engineering, Technology & Applied Science Research","volume":"140 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141281504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Data Security through Machine Learning-based Key Generation and Encryption 通过基于机器学习的密钥生成和加密提高数据安全性
Pub Date : 2024-06-01 DOI: 10.48084/etasr.7181
Abhishek Saini, Ruchi Sehrawat
In an era marked by growing concerns about data security and privacy, the need for robust encryption techniques has become a matter of paramount importance. The primary goal of this study is to protect sensitive information during transmission while ensuring efficient and reliable decryption at the receiver's side. To generate robust and unique cryptographic keys, the proposed approach trains an autoencoder neural network based on hashing and optionally generated prime numbers in the MNIST dataset. The key serves as the foundation for secure communication. An additional security layer to the cryptographic algorithm passing through the first ciphertext, was employed utilizing the XORed and Blum-Blum-Shub (BBS) generators to make the system resistant to various types of attacks. This approach offers a robust and innovative solution for secure data transmission, combining the strengths of autoencoder-based key generation and cryptographic encryption. Its effectiveness is demonstrated through testing and simulations.
在这个对数据安全和隐私日益关注的时代,对强大加密技术的需求已成为一个至关重要的问题。本研究的主要目标是在传输过程中保护敏感信息,同时确保接收方进行高效可靠的解密。为了生成稳健而独特的加密密钥,所提出的方法基于散列和在 MNIST 数据集中可选生成的素数来训练自动编码器神经网络。密钥是安全通信的基础。利用 XORed 和 Blum-Blum-Shub (BBS) 生成器,为通过第一个密码文本的加密算法增加了一个安全层,使系统能够抵御各种类型的攻击。这种方法结合了基于自动编码器的密钥生成和加密的优势,为安全数据传输提供了一种稳健而创新的解决方案。通过测试和模拟证明了它的有效性。
{"title":"Enhancing Data Security through Machine Learning-based Key Generation and Encryption","authors":"Abhishek Saini, Ruchi Sehrawat","doi":"10.48084/etasr.7181","DOIUrl":"https://doi.org/10.48084/etasr.7181","url":null,"abstract":"In an era marked by growing concerns about data security and privacy, the need for robust encryption techniques has become a matter of paramount importance. The primary goal of this study is to protect sensitive information during transmission while ensuring efficient and reliable decryption at the receiver's side. To generate robust and unique cryptographic keys, the proposed approach trains an autoencoder neural network based on hashing and optionally generated prime numbers in the MNIST dataset. The key serves as the foundation for secure communication. An additional security layer to the cryptographic algorithm passing through the first ciphertext, was employed utilizing the XORed and Blum-Blum-Shub (BBS) generators to make the system resistant to various types of attacks. This approach offers a robust and innovative solution for secure data transmission, combining the strengths of autoencoder-based key generation and cryptographic encryption. Its effectiveness is demonstrated through testing and simulations.","PeriodicalId":364936,"journal":{"name":"Engineering, Technology & Applied Science Research","volume":"44 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141279530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Engineering, Technology & Applied Science Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1