首页 > 最新文献

Recent Advances in Computer Science and Communications最新文献

英文 中文
Selection of Digital Watermarking Techniques for Medical Image Security by using the Fuzzy Analytical Hierarchy Process 基于模糊层次分析法的医学图像安全数字水印技术选择
Q3 Computer Science Pub Date : 2023-05-02 DOI: 10.2174/2666255816666230502100729
Masood Ahmad, M. Nadeem, Monamy Islam, Saquib Ali, A. Agrawal, Raees Ahmad Khan
The watermarking technique is a security algorithm for medical images and the patient's information. Watermarking is used for maintaining the robustness, integrity, confidentiality, authentication, and complexity of medical images.The selection of medical image watermarking technique is multi-criteria decision-making and an automatic way of algorithm selection for security and privacy. However, it is difficult to select a better watermarking technique through traditional selection techniques.To deal with this problem, a multicriteria-based fuzzy analytic hierarchy process (FAHP) was proposed. This method is applied for algorithm selection for the security of medical images in healthcare. In this method, we first determined the list of criteria and alternatives, which directly affect the decision of the medical image security algorithm. Then, the proposed method was applied to the criteria and alternatives.We provided the rank according to the obtained weights of the algorithm. Furthermore, the overall results and ranking of the algorithms were also presented in this article.Integrity was found to have the highest weight (0.509) compared to the other criteria. The weight of the other criteria, namely authentication, was 0.165, robustness was 0.151, confidentiality was 0.135, and complexity was 0.038. Thus, in terms of ranking, integrity was reported to be of the highest priority among the five criteria attributes.
水印技术是一种医学图像和患者信息的安全算法。水印用于保持医学图像的鲁棒性、完整性、机密性、身份验证和复杂性。医学图像水印技术的选择是多准则决策,是一种兼顾安全性和保密性的自动算法选择方法。然而,通过传统的选择技术很难选择出更好的水印技术。为了解决这一问题,提出了一种基于多准则的模糊层次分析法。将该方法应用于医疗图像安全的算法选择。在该方法中,我们首先确定了准则和备选项列表,它们直接影响到医学图像安全算法的决策。然后,将该方法应用于准则和备选方案。我们根据算法得到的权重给出秩。此外,本文还给出了各算法的总体结果和排名。与其他标准相比,完整性的权重最高(0.509)。其他标准(即认证)的权重为0.165,鲁棒性为0.151,机密性为0.135,复杂性为0.038。因此,就排名而言,在五个标准属性中,完整性被报告为最高优先级。
{"title":"Selection of Digital Watermarking Techniques for Medical Image Security by using the Fuzzy Analytical Hierarchy Process","authors":"Masood Ahmad, M. Nadeem, Monamy Islam, Saquib Ali, A. Agrawal, Raees Ahmad Khan","doi":"10.2174/2666255816666230502100729","DOIUrl":"https://doi.org/10.2174/2666255816666230502100729","url":null,"abstract":"\u0000\u0000The watermarking technique is a security algorithm for medical images and the patient's information. Watermarking is used for maintaining the robustness, integrity, confidentiality, authentication, and complexity of medical images.\u0000\u0000\u0000\u0000The selection of medical image watermarking technique is multi-criteria decision-making and an automatic way of algorithm selection for security and privacy. However, it is difficult to select a better watermarking technique through traditional selection techniques.\u0000\u0000\u0000\u0000To deal with this problem, a multicriteria-based fuzzy analytic hierarchy process (FAHP) was proposed. This method is applied for algorithm selection for the security of medical images in healthcare. In this method, we first determined the list of criteria and alternatives, which directly affect the decision of the medical image security algorithm. Then, the proposed method was applied to the criteria and alternatives.\u0000\u0000\u0000\u0000We provided the rank according to the obtained weights of the algorithm. Furthermore, the overall results and ranking of the algorithms were also presented in this article.\u0000\u0000\u0000\u0000Integrity was found to have the highest weight (0.509) compared to the other criteria. The weight of the other criteria, namely authentication, was 0.165, robustness was 0.151, confidentiality was 0.135, and complexity was 0.038. Thus, in terms of ranking, integrity was reported to be of the highest priority among the five criteria attributes.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47425021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meet the Editorial Board Members 与编辑委员会成员见面
Q3 Computer Science Pub Date : 2023-05-01 DOI: 10.2174/266625581604230119152239
Ihsan Ali
{"title":"Meet the Editorial Board Members","authors":"Ihsan Ali","doi":"10.2174/266625581604230119152239","DOIUrl":"https://doi.org/10.2174/266625581604230119152239","url":null,"abstract":"","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Patent Selections 专利的选择
Q3 Computer Science Pub Date : 2023-05-01 DOI: 10.2174/266625581604230119153144
{"title":"Patent Selections","authors":"","doi":"10.2174/266625581604230119153144","DOIUrl":"https://doi.org/10.2174/266625581604230119153144","url":null,"abstract":"","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135753423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Spectrum Sensing in Cognitive Radio Networks: A Systematic Review 认知无线电网络中的协同频谱感知:系统综述
Q3 Computer Science Pub Date : 2023-05-01 DOI: 10.2174/2666255816666221005095538
Vaishali Yadav, Sharad Jain, Ashwani Kumar Yadav, Raj Kumar
Background: Spectrum is the backbone for wireless communications including internet services. Now days, the business of industries providing wired communication is constant while the business of industries dealing with wireless communications is growing very fast. There is large demand of radio spectrum for new wireless multimedia services. Although the present fixed spectrum allotment schemes do not cause any interference between users, but this fixed scheme of spectrum allocation do not allow accommodating the spectrum required for new wireless services. Cognitive radio (CR) relies on spectrum sensing to discover available frequency bands so that the spectrum can be used to its full potential, thus avoiding interference to the primary users (PU). Objectives: The purpose of this work is to present an in-depth overview of traditional as well as advanced artificial intelligence and machine learning based cooperative spectrum sensing (CSS) in cognitive radio networks. Method: Using the principles of artificial intelligence (AI), systems are able to solve issues by mimicking the function of human brains. Moreover, since its inception, machine learning has demonstrated that it is capable of solving a wide range of computational issues. Recent advancements in artificial intelligence techniques and machine learning (ML) have made it an emergent technology in spectrum sensing. Result: The result shows that more than 80% papers are on traditional spectrum sensing while less than 20% deals with artificial intelligence and machine learning approaches. More than 75% papers address the limitation of local spectrum sensing. The study presents the various methods implemented in the spectrum sensing along with merits and challenges. Conclusion: Spectrum sensing techniques are hampered by a variety of issues, including fading, shadowing, and receiver unpredictability. Challenges, benefits, drawbacks, and scope of cooperative sensing are examined and summarized. With this survey article, academics may clearly know the numerous conventional artificial intelligence and machine learning methodologies used and can connect sharp audiences to contemporary research done in cognitive radio networks, which is now underway.
背景:频谱是包括互联网服务在内的无线通信的骨干。如今,提供有线通信的行业业务是恒定的,而处理无线通信的行业业务增长非常快。新的无线多媒体业务对无线电频谱有很大的需求。虽然目前的固定频谱分配方案不会造成用户之间的干扰,但这种固定频谱分配方案无法容纳新无线业务所需的频谱。认知无线电(CR)依靠频谱感知来发现可用的频段,从而充分利用频谱,从而避免对主要用户(PU)的干扰。目的:本工作的目的是对认知无线电网络中基于协作频谱感知(CSS)的传统以及先进的人工智能和机器学习进行深入概述。方法:利用人工智能(AI)的原理,系统能够通过模仿人类大脑的功能来解决问题。此外,自从机器学习诞生以来,它已经证明了它能够解决广泛的计算问题。人工智能技术和机器学习(ML)的最新进展使其成为频谱传感领域的新兴技术。结果:超过80%的论文是关于传统的频谱传感,而不到20%的论文是关于人工智能和机器学习方法的。超过75%的论文讨论了局部频谱感知的局限性。本文介绍了在频谱传感中实现的各种方法,以及它们的优点和面临的挑战。结论:频谱传感技术受到各种问题的阻碍,包括衰落、阴影和接收器不可预测性。对协同传感的挑战、优点、缺点和范围进行了分析和总结。通过这篇调查文章,学者们可以清楚地了解所使用的众多传统人工智能和机器学习方法,并可以将敏锐的受众与正在进行的认知无线电网络的当代研究联系起来。
{"title":"Cooperative Spectrum Sensing in Cognitive Radio Networks: A Systematic Review","authors":"Vaishali Yadav, Sharad Jain, Ashwani Kumar Yadav, Raj Kumar","doi":"10.2174/2666255816666221005095538","DOIUrl":"https://doi.org/10.2174/2666255816666221005095538","url":null,"abstract":"Background: Spectrum is the backbone for wireless communications including internet services. Now days, the business of industries providing wired communication is constant while the business of industries dealing with wireless communications is growing very fast. There is large demand of radio spectrum for new wireless multimedia services. Although the present fixed spectrum allotment schemes do not cause any interference between users, but this fixed scheme of spectrum allocation do not allow accommodating the spectrum required for new wireless services. Cognitive radio (CR) relies on spectrum sensing to discover available frequency bands so that the spectrum can be used to its full potential, thus avoiding interference to the primary users (PU). Objectives: The purpose of this work is to present an in-depth overview of traditional as well as advanced artificial intelligence and machine learning based cooperative spectrum sensing (CSS) in cognitive radio networks. Method: Using the principles of artificial intelligence (AI), systems are able to solve issues by mimicking the function of human brains. Moreover, since its inception, machine learning has demonstrated that it is capable of solving a wide range of computational issues. Recent advancements in artificial intelligence techniques and machine learning (ML) have made it an emergent technology in spectrum sensing. Result: The result shows that more than 80% papers are on traditional spectrum sensing while less than 20% deals with artificial intelligence and machine learning approaches. More than 75% papers address the limitation of local spectrum sensing. The study presents the various methods implemented in the spectrum sensing along with merits and challenges. Conclusion: Spectrum sensing techniques are hampered by a variety of issues, including fading, shadowing, and receiver unpredictability. Challenges, benefits, drawbacks, and scope of cooperative sensing are examined and summarized. With this survey article, academics may clearly know the numerous conventional artificial intelligence and machine learning methodologies used and can connect sharp audiences to contemporary research done in cognitive radio networks, which is now underway.","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135702915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PUPC-GANs: A Novel Image Conversion Model using Modified CycleGANs in Healthcare PUPC-GANs:在医疗保健中使用改进的CycleGANs的新型图像转换模型
Q3 Computer Science Pub Date : 2023-03-30 DOI: 10.2174/2666255816666230330100005
Shweta Taneja, Bhawna Suri, Aman Roy, Ashish Chowdhry, H. kumar, Kautuk Dwivedi
Magnetic resonance imaging (MRI) and computed tomography (CT) both have their areas of specialty in the medical imaging world. MRI is considered to be a safer modality as it exploits the magnetic properties of the hydrogen nucleus. Whereas a CT scan uses multiple X-rays, which is known to contribute to carcinogenesis and is associated with affecting the patient's health.In scenarios such as Radiation Therapy, where both MRI and CT are required for medical treatment, a unique approach to getting both scans would be to obtain MRI and generate a CT scan from it.In scenarios, such as radiation therapy, where both MRI and CT are required for medical treatment, a unique approach to getting both scans would be to obtain MRI and generate a CT scan from it. Current deep learning methods for MRI to CT synthesis purely use either paired data or unpaired data. Models trained with paired data suffer due to a lack of availability of well-aligned data.Training with unpaired data might generate visually realistic images, although it still does not guarantee good accuracy. To overcome this, we proposed a new model called PUPC-GANs (Paired Unpaired CycleGANs), based on CycleGANs (Cycle-Consistent Adversarial Networks).Training with unpaired data might generate visually realistic images, although it still does not guarantee good accuracy. To overcome this, we propose a new model called PUPC-GANs (Paired Unpaired CycleGANs), based on CycleGANs (Cycle-Consistent Adversarial Networks).This model is capable of learning transformations utilizing both paired and unpaired data. To support this, a paired loss is introduced. Comparing MAE, MSE, NRMSE, PSNR, and SSIM metrics, PUPC-GANs outperform CycleGANs.Despite MRI and CT having different areas of application, there are use cases like Radiation Therapy, where both of them are required. A feasible approach to obtaining these images is to synthesize CT from MRI scans. Current methods fail to use paired data along with abundantly available unpaired data. The proposed model (PUPC-GANs) is able to utilize the presence of paired data during the training phase. This ability in combination with the conventional model of CycleGANs produces significant improvement in results as compared to training only with unpaired data. When comparing the two models using loss metrics, which include MAE, MSE, NRMSE, and PSNR, the proposed model outperforms CycleGANs. An SSIM of 0.8 is achieved, which is superior to the one obtained by CycleGANs. The proposed model produces comparable results on visual examination.
磁共振成像(MRI)和计算机断层扫描(CT)在医学成像领域都有各自的专业领域。核磁共振成像被认为是一种更安全的方式,因为它利用了氢核的磁性。而CT扫描使用多个x射线,这是已知的致癌作用,并与影响病人的健康有关。在诸如放射治疗的情况下,医学治疗需要MRI和CT,获得这两种扫描的独特方法是获得MRI并从中生成CT扫描。在某些情况下,例如放射治疗,在医疗治疗中需要MRI和CT,获得这两种扫描的独特方法是获得MRI并从中生成CT扫描。目前用于MRI到CT合成的深度学习方法要么纯粹使用成对数据,要么使用非成对数据。使用配对数据训练的模型由于缺乏良好对齐数据的可用性而受到影响。使用非配对数据进行训练可能会生成视觉上逼真的图像,尽管它仍然不能保证良好的准确性。为了克服这个问题,我们提出了一种基于循环一致对抗网络的新模型PUPC-GANs(成对未配对循环网络)。使用非配对数据进行训练可能会生成视觉上逼真的图像,尽管它仍然不能保证良好的准确性。为了克服这个问题,我们提出了一种基于循环一致对抗网络的新模型PUPC-GANs(成对未配对循环网络)。该模型能够利用成对和非成对数据学习转换。为了支持这一点,引入了成对损失。比较MAE、MSE、NRMSE、PSNR和SSIM指标,pupc - gan优于cyclegan。尽管MRI和CT有不同的应用领域,但在放射治疗等用例中,两者都是必需的。一种可行的获取这些图像的方法是将MRI扫描合成CT。目前的方法不能使用成对数据以及大量可用的非成对数据。提出的模型(PUPC-GANs)能够在训练阶段利用成对数据的存在。这种能力与传统的cyclegan模型相结合,与仅使用非配对数据进行训练相比,结果有了显著改善。当使用损失指标(包括MAE、MSE、NRMSE和PSNR)比较两种模型时,所提出的模型优于cyclegan。SSIM为0.8,优于cyclegan算法。所提出的模型在视觉检查上产生可比较的结果。
{"title":"PUPC-GANs: A Novel Image Conversion Model using Modified CycleGANs in Healthcare","authors":"Shweta Taneja, Bhawna Suri, Aman Roy, Ashish Chowdhry, H. kumar, Kautuk Dwivedi","doi":"10.2174/2666255816666230330100005","DOIUrl":"https://doi.org/10.2174/2666255816666230330100005","url":null,"abstract":"\u0000\u0000Magnetic resonance imaging (MRI) and computed tomography (CT) both have their areas of specialty in the medical imaging world. MRI is considered to be a safer modality as it exploits the magnetic properties of the hydrogen nucleus. Whereas a CT scan uses multiple X-rays, which is known to contribute to carcinogenesis and is associated with affecting the patient's health.\u0000\u0000\u0000\u0000In scenarios such as Radiation Therapy, where both MRI and CT are required for medical treatment, a unique approach to getting both scans would be to obtain MRI and generate a CT scan from it.\u0000\u0000\u0000\u0000In scenarios, such as radiation therapy, where both MRI and CT are required for medical treatment, a unique approach to getting both scans would be to obtain MRI and generate a CT scan from it. Current deep learning methods for MRI to CT synthesis purely use either paired data or unpaired data. Models trained with paired data suffer due to a lack of availability of well-aligned data.\u0000\u0000\u0000\u0000Training with unpaired data might generate visually realistic images, although it still does not guarantee good accuracy. To overcome this, we proposed a new model called PUPC-GANs (Paired Unpaired CycleGANs), based on CycleGANs (Cycle-Consistent Adversarial Networks).\u0000\u0000\u0000\u0000Training with unpaired data might generate visually realistic images, although it still does not guarantee good accuracy. To overcome this, we propose a new model called PUPC-GANs (Paired Unpaired CycleGANs), based on CycleGANs (Cycle-Consistent Adversarial Networks).\u0000\u0000\u0000\u0000This model is capable of learning transformations utilizing both paired and unpaired data. To support this, a paired loss is introduced. Comparing MAE, MSE, NRMSE, PSNR, and SSIM metrics, PUPC-GANs outperform CycleGANs.\u0000\u0000\u0000\u0000Despite MRI and CT having different areas of application, there are use cases like Radiation Therapy, where both of them are required. A feasible approach to obtaining these images is to synthesize CT from MRI scans. Current methods fail to use paired data along with abundantly available unpaired data. The proposed model (PUPC-GANs) is able to utilize the presence of paired data during the training phase. This ability in combination with the conventional model of CycleGANs produces significant improvement in results as compared to training only with unpaired data. When comparing the two models using loss metrics, which include MAE, MSE, NRMSE, and PSNR, the proposed model outperforms CycleGANs. An SSIM of 0.8 is achieved, which is superior to the one obtained by CycleGANs. The proposed model produces comparable results on visual examination.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45928699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Generation Method Based on Improved Generative Adversarial Network 基于改进生成对抗网络的图像生成方法
Q3 Computer Science Pub Date : 2023-03-30 DOI: 10.2174/2666255816666230330153428
Zhang Huanjun
The image generation model based on generative adversarial network (GAN) has achieved remarkable achievements. However, traditional GAN has the disadvantage of unstable training, which affects the quality of the generated image.This method is to solve the GAN image generation problems of poor image quality, single image category, and slow model convergence.An improved image generation method is proposed based on (GAN). Firstly, the attention mechanism is introduced into the convolution layer of the generator and discriminator. And a batch normalization layer is added after each convolution layer. Secondly, the ReLU and leaky ReLU are used as the active layer of the generator and discriminator, respectively. Thirdly, the transposed convolution is used in the generator while the small step convolution is used in the discriminator, respectively. Fourthly, a new discarding method is applied in the dropout layer.The experiments are carried out on Caltech 101 dataset. The experimental results show that the image quality generated by the proposed method is better than that generated by GAN with attention mechanism (AM-GAN) and GAN with stable training strategy (STS-GAN). And the stability is improved.The proposed method is effectiveness for image generation with high quality.
基于生成对抗性网络的图像生成模型取得了显著的成果。然而,传统的GAN存在训练不稳定的缺点,影响了生成图像的质量。该方法解决了GAN图像质量差、图像类别单一、模型收敛慢的问题。提出了一种基于(GAN)的改进图像生成方法。首先,将注意力机制引入生成器和鉴别器的卷积层。并且在每个卷积层之后添加一个批量归一化层。其次,ReLU和泄漏ReLU分别用作生成器和鉴别器的有源层。第三,生成器中分别使用转置卷积,鉴别器中分别使用小步卷积。第四,在丢弃层中应用了一种新的丢弃方法。实验是在加州理工学院101数据集上进行的。实验结果表明,该方法生成的图像质量优于具有注意力机制的GAN和具有稳定训练策略的GAN。并且稳定性得到提高。所提出的方法对于高质量的图像生成是有效的。
{"title":"Image Generation Method Based on Improved Generative Adversarial Network","authors":"Zhang Huanjun","doi":"10.2174/2666255816666230330153428","DOIUrl":"https://doi.org/10.2174/2666255816666230330153428","url":null,"abstract":"\u0000\u0000The image generation model based on generative adversarial network (GAN) has achieved remarkable achievements. However, traditional GAN has the disadvantage of unstable training, which affects the quality of the generated image.\u0000\u0000\u0000\u0000This method is to solve the GAN image generation problems of poor image quality, single image category, and slow model convergence.\u0000\u0000\u0000\u0000An improved image generation method is proposed based on (GAN). Firstly, the attention mechanism is introduced into the convolution layer of the generator and discriminator. And a batch normalization layer is added after each convolution layer. Secondly, the ReLU and leaky ReLU are used as the active layer of the generator and discriminator, respectively. Thirdly, the transposed convolution is used in the generator while the small step convolution is used in the discriminator, respectively. Fourthly, a new discarding method is applied in the dropout layer.\u0000\u0000\u0000\u0000The experiments are carried out on Caltech 101 dataset. The experimental results show that the image quality generated by the proposed method is better than that generated by GAN with attention mechanism (AM-GAN) and GAN with stable training strategy (STS-GAN). And the stability is improved.\u0000\u0000\u0000\u0000The proposed method is effectiveness for image generation with high quality.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49558665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on Applicability and Utilization of Blockchain Technology in Ubiquitous Computing 区块链技术在普适计算中的适用性与应用综述
Q3 Computer Science Pub Date : 2023-03-21 DOI: 10.2174/2666255816666230321120653
Rajesh Kumar Tyagi, Ramander Singh, Anil Kumar Mishra, U. Choudhury
In typical Internet of Things (IoT) networks, data is sent from sensors to fog devices and then onto a central cloud server. One single point of failure, a slowdown in the flow of data, identification, security, connection, privacy concerns caused by a third party managing cloud servers, and the difficulty of frequently updating the firmware on millions of smart devices from both a maintenance and a security point of view are just some of the problems that can occur. The evolution of ubiquitous computing and blockchain technology has inspired researchers worldwide in recent years. Key features of blockchain technology, such as the fact that it can't be changed and a decentralised and distributed approach to data security, have made it a popular choice for developing diverse applications. With the practically significant applicability of blockchain concepts (specifically consensus methods), modern-day applications in ubiquitous computing and other related areas have significantly benefited. In addition, we have taken advantage of the widely available blockchain platforms and looked into potential new study fields. As a result, this review paper elaborates the novel alternative privacy preservation options while simultaneously focusing on the universal domain as a starting point for blockchain technology applications. We also discuss obstacles, research gaps, and solutions. This review can assist early researchers who are beginning to investigate the applicability of blockchain technology in ubiquitous computing. It is also possible to use it as a reference in order to speed up the process of finding the appropriate markers for ongoing research subjects that are of interest.
在典型的物联网(IoT)网络中,数据从传感器发送到雾设备,然后发送到中央云服务器。单点故障、数据流放缓、识别、安全、连接、第三方管理云服务器引起的隐私问题,以及从维护和安全角度频繁更新数百万智能设备固件的困难,这些都是可能发生的一些问题。近年来,无处不在的计算和区块链技术的发展激发了全世界的研究人员。区块链技术的关键特性,例如它不能被更改的事实以及数据安全的分散和分布式方法,使其成为开发各种应用程序的热门选择。随着区块链概念(特别是共识方法)的实际重要适用性,普适计算和其他相关领域的现代应用程序已显著受益。此外,我们利用了广泛可用的区块链平台,并研究了潜在的新研究领域。因此,本文阐述了新的替代隐私保护选项,同时将重点放在通用域作为区块链技术应用的起点。我们还讨论了障碍、研究差距和解决方案。这篇综述可以帮助早期研究人员开始研究区块链技术在普适计算中的适用性。也可以将其用作参考,以便加快为正在进行的感兴趣的研究课题寻找适当标记的过程。
{"title":"Review on Applicability and Utilization of Blockchain Technology in Ubiquitous Computing","authors":"Rajesh Kumar Tyagi, Ramander Singh, Anil Kumar Mishra, U. Choudhury","doi":"10.2174/2666255816666230321120653","DOIUrl":"https://doi.org/10.2174/2666255816666230321120653","url":null,"abstract":"\u0000\u0000In typical Internet of Things (IoT) networks, data is sent from sensors to fog devices and then onto a central cloud server. One single point of failure, a slowdown in the flow of data, identification, security, connection, privacy concerns caused by a third party managing cloud servers, and the difficulty of frequently updating the firmware on millions of smart devices from both a maintenance and a security point of view are just some of the problems that can occur. The evolution of ubiquitous computing and blockchain technology has inspired researchers worldwide in recent years. Key features of blockchain technology, such as the fact that it can't be changed and a decentralised and distributed approach to data security, have made it a popular choice for developing diverse applications. With the practically significant applicability of blockchain concepts (specifically consensus methods), modern-day applications in ubiquitous computing and other related areas have significantly benefited. In addition, we have taken advantage of the widely available blockchain platforms and looked into potential new study fields. As a result, this review paper elaborates the novel alternative privacy preservation options while simultaneously focusing on the universal domain as a starting point for blockchain technology applications. We also discuss obstacles, research gaps, and solutions. This review can assist early researchers who are beginning to investigate the applicability of blockchain technology in ubiquitous computing. It is also possible to use it as a reference in order to speed up the process of finding the appropriate markers for ongoing research subjects that are of interest.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44090635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeepFake Detection with Remote Heart Rate Estimation Using 3D Central Difference Convolution Attention Network 基于三维中心差分卷积注意力网络的远程心率估计深度伪造检测
Q3 Computer Science Pub Date : 2023-03-01 DOI: 10.2174/2666255816666230301091725
Hua Ma, Xiao Feng, Yijie Sun
As GAN-based deepfakes have become increasingly mature and real-istic, the demand for effective deepfake detectors has become essential. We are inspired by the fact that normal pulse rhythms present in real-face video can be decreased or even completely interrupted in a deepfake video; thus, we have in-troduced a new deepfake detection approach based on remote heart rate estima-tion using the 3D Cental Difference Convolution Attention Network (CDCAN).Our proposed fake detector is mainly composed of a 3D CDCAN with an inverse attention mechanism and LSTM architecture. It utilizes 3D central difference convolution to enhance the spatiotemporal representation, which can capture rich physiological-related temporal context by gathering the time differ-ence information. The soft attention mechanism is to focus on the skin region of interest, while the inverse attention mechanism is to further denoise rPPG signals.Results: The performance of our approach is evaluated on the two latest Ce-leb-DF and DFDC datasets, for which the experiment results show that our pro-posed approach achieves an accuracy of 99.5% and 97.4%, respectively.It utilizes 3D central difference convolution to enhance the spatiotemporal representation which can capture rich physiological related temporal context by gathering time difference information. The soft attention mechanism is to focus on the skin region of interest, while the inverse attention mechanism is to further denoise rPPG signals.Our approach outperforms the state-of-art methods and proves the effectiveness of our DeepFake detector.None
随着基于gan的深度伪造越来越成熟和现实,对有效深度伪造探测器的需求变得至关重要。我们的灵感来自于这样一个事实,即真实面部视频中存在的正常脉搏节奏可以在深度假视频中减少甚至完全中断;因此,我们引入了一种新的基于远程心率估计的深度假检测方法,该方法使用3D中心差分卷积注意网络(CDCAN)。我们提出的假检测器主要由具有逆注意机制的三维CDCAN和LSTM结构组成。该方法利用三维中心差分卷积增强时空表征,通过收集时空差分信息,捕捉到丰富的生理相关时间背景。软注意机制是将注意力集中在感兴趣的皮肤区域,而逆注意机制是对rPPG信号进一步去噪。结果:在最新的两个Ce-leb-DF和DFDC数据集上对我们的方法进行了性能评估,实验结果表明,我们提出的方法分别达到了99.5%和97.4%的准确率。利用三维中心差分卷积增强时空表征,通过收集时差信息捕获丰富的生理相关时间背景。软注意机制是将注意力集中在感兴趣的皮肤区域,而逆注意机制是对rPPG信号进一步去噪。我们的方法优于最先进的方法,并证明了我们的DeepFake检测器的有效性。没有一个
{"title":"DeepFake Detection with Remote Heart Rate Estimation Using 3D Central Difference Convolution Attention Network","authors":"Hua Ma, Xiao Feng, Yijie Sun","doi":"10.2174/2666255816666230301091725","DOIUrl":"https://doi.org/10.2174/2666255816666230301091725","url":null,"abstract":"\u0000\u0000As GAN-based deepfakes have become increasingly mature and real-istic, the demand for effective deepfake detectors has become essential. We are inspired by the fact that normal pulse rhythms present in real-face video can be decreased or even completely interrupted in a deepfake video; thus, we have in-troduced a new deepfake detection approach based on remote heart rate estima-tion using the 3D Cental Difference Convolution Attention Network (CDCAN).\u0000\u0000\u0000\u0000Our proposed fake detector is mainly composed of a 3D CDCAN with an inverse attention mechanism and LSTM architecture. It utilizes 3D central difference convolution to enhance the spatiotemporal representation, which can capture rich physiological-related temporal context by gathering the time differ-ence information. The soft attention mechanism is to focus on the skin region of interest, while the inverse attention mechanism is to further denoise rPPG signals.\u0000\u0000\u0000\u0000Results: The performance of our approach is evaluated on the two latest Ce-leb-DF and DFDC datasets, for which the experiment results show that our pro-posed approach achieves an accuracy of 99.5% and 97.4%, respectively.\u0000\u0000\u0000\u0000It utilizes 3D central difference convolution to enhance the spatiotemporal representation which can capture rich physiological related temporal context by gathering time difference information. The soft attention mechanism is to focus on the skin region of interest, while the inverse attention mechanism is to further denoise rPPG signals.\u0000\u0000\u0000\u0000Our approach outperforms the state-of-art methods and proves the effectiveness of our DeepFake detector.\u0000\u0000\u0000\u0000None\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41939338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Exploratory Study on Code Smells During Code Review in OSS Projects: A Case Study on OpenStack and WikiMedia 开源项目代码评审过程中代码气味的探索性研究——以OpenStack和WikiMedia为例
Q3 Computer Science Pub Date : 2023-02-22 DOI: 10.2174/2666255816666230222112313
E. Boonchieng, Aziz Nanthaamornphong
Open-source software (OSS) has become an important choice for developing software applications, and its usage has exponentially increased in recent years. Although many OSS systems have shown high reliability in terms of their functionality, they often exhibit several quality issues. Since most developers focus primarily on meeting clients’ functional requirements within the appropriate deadlines, the outcome suffers from poor design and implementation practices. This issue can also manifest as software code smells, resulting in a variety of quality issues such as software maintainability, comprehensibility, and extensibility. Generally speaking, OSS developers use code reviews during their software development to discover flaws or bugs in the updated code before it is merged with the code base. Nevertheless, despite the harmful impacts of code smells on software projects, the extent to which developers do consider them in the code review process is unclear in practice.Open-source software (OSS) has become an important choice for developing software applications, and its usage is exponentially increasing in recent years. While many OSS systems have shown high reliability in terms of their functionality, they often exhibit several quality issues. Since most developers focus primarily on meeting clients’ functional requirements within the appropriate deadlines, the outcome suffers from poor design and implementation practices.To better understand the code review process in OSS projects, we gathered the comments of code reviewers who specified where developers should fix code smells in two OSS projects, OpenStack and WikiMedia, between 2011 and 2015.Since most developers focus primarily on meeting clients’ functional requirements within the appropriate deadlines, the outcome suffers from poor design and implementation practices. This problem can further manifest in the form of software code smells leading to multiple quality issues including software maintainability, comprehensibility, and extensibility.Our findings indicate that most code reviewers do not pay much attention to code smells. Only a few code reviewers have attempted to motivate developers to improve their source code quality in general. The results also show that there is an increasing tendency to provide advice concerning code smells corrections over time.We believe that this study's findings will encourage developers to use new software engineering practices, such as refactoring, to reduce code smells when developing OSS.-
开放源码软件(OSS)已成为开发软件应用程序的重要选择,近年来其使用量呈指数级增长。尽管许多OSS系统在功能方面表现出了很高的可靠性,但它们经常会出现一些质量问题。由于大多数开发人员主要关注在适当的截止日期内满足客户的功能需求,因此设计和实现实践不佳。这个问题也可能表现为软件代码的气味,导致各种质量问题,如软件的可维护性、可理解性和可扩展性。一般来说,OSS开发人员在软件开发过程中会使用代码评审来发现更新后的代码中的缺陷或bug,然后再将其与代码库合并。然而,尽管代码气味对软件项目有有害影响,但在实践中,开发人员在代码审查过程中对它们的考虑程度尚不清楚。开放源码软件(OSS)已成为开发软件应用程序的重要选择,近年来其使用量呈指数级增长。尽管许多OSS系统在功能方面表现出了很高的可靠性,但它们经常会出现一些质量问题。由于大多数开发人员主要关注在适当的截止日期内满足客户的功能需求,因此设计和实现实践不佳。为了更好地理解OSS项目中的代码审查过程,我们收集了代码审查人员的意见,他们在2011年至2015年间指定了开发人员应该在哪里修复OpenStack和WikiMedia这两个OSS项目的代码气味。由于大多数开发人员主要关注在适当的截止日期内满足客户的功能需求,其结果是设计和实施实践不力。这个问题可能会以软件代码气味的形式进一步表现出来,从而导致多个质量问题,包括软件的可维护性、可理解性和可扩展性。我们的研究结果表明,大多数代码审查人员并不太关注代码气味。只有少数代码评审员试图激励开发人员提高他们的源代码质量。结果还表明,随着时间的推移,提供有关代码气味校正的建议的趋势越来越大。我们相信,这项研究的发现将鼓励开发人员在开发OSS时使用新的软件工程实践,如重构,以减少代码气味-
{"title":"An Exploratory Study on Code Smells During Code Review in OSS Projects: A Case Study on OpenStack and WikiMedia","authors":"E. Boonchieng, Aziz Nanthaamornphong","doi":"10.2174/2666255816666230222112313","DOIUrl":"https://doi.org/10.2174/2666255816666230222112313","url":null,"abstract":"\u0000\u0000Open-source software (OSS) has become an important choice for developing software applications, and its usage has exponentially increased in recent years. Although many OSS systems have shown high reliability in terms of their functionality, they often exhibit several quality issues. Since most developers focus primarily on meeting clients’ functional requirements within the appropriate deadlines, the outcome suffers from poor design and implementation practices. This issue can also manifest as software code smells, resulting in a variety of quality issues such as software maintainability, comprehensibility, and extensibility. Generally speaking, OSS developers use code reviews during their software development to discover flaws or bugs in the updated code before it is merged with the code base. Nevertheless, despite the harmful impacts of code smells on software projects, the extent to which developers do consider them in the code review process is unclear in practice.\u0000\u0000\u0000\u0000Open-source software (OSS) has become an important choice for developing software applications, and its usage is exponentially increasing in recent years. While many OSS systems have shown high reliability in terms of their functionality, they often exhibit several quality issues. Since most developers focus primarily on meeting clients’ functional requirements within the appropriate deadlines, the outcome suffers from poor design and implementation practices.\u0000\u0000\u0000\u0000To better understand the code review process in OSS projects, we gathered the comments of code reviewers who specified where developers should fix code smells in two OSS projects, OpenStack and WikiMedia, between 2011 and 2015.\u0000\u0000\u0000\u0000Since most developers focus primarily on meeting clients’ functional requirements within the appropriate deadlines, the outcome suffers from poor design and implementation practices. This problem can further manifest in the form of software code smells leading to multiple quality issues including software maintainability, comprehensibility, and extensibility.\u0000\u0000\u0000\u0000Our findings indicate that most code reviewers do not pay much attention to code smells. Only a few code reviewers have attempted to motivate developers to improve their source code quality in general. The results also show that there is an increasing tendency to provide advice concerning code smells corrections over time.\u0000\u0000\u0000\u0000We believe that this study's findings will encourage developers to use new software engineering practices, such as refactoring, to reduce code smells when developing OSS.\u0000\u0000\u0000\u0000-\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43047655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UCDM: A User-Centric Data Model in Power Blockchain UCDM:电力区块链中以用户为中心的数据模型
Q3 Computer Science Pub Date : 2023-01-12 DOI: 10.2174/2666255816666230112165555
Zhixing Lv, Hui Yu, Kai Kang, Teng Chang Li, Guo Li Du
As innovative information technology, blockchain has combined the advantages of decentralization, immutability, data provenance, and contract operation automatically, which can be used to solve the issues of single point failure, high trading cost, low effectiveness, and data potential risk in power trading. However, in the traditional power blockchain, the design of functional components in blockchain, such as the data structure of the block, does not take the actual features of power into account, thus leading to a performance bottleneck in practical application. Motivated by business characteristics of power trading, a user-centric data model UCDM in consortium blockchain is proposed to achieve efficient data storage and quick data retrieval.The proposed UCDM is designed by considering the requirements of transaction retrieval and analysis, thus supporting the requirements of concurrent data requests and mass data storage. The ID of each user will independently form its own chain over the blockchain.Compared with the traditional data model, the extensive experimental results demonstrate that the proposed UCDM has shorter processing delay, higher throughput, and shorter response latency, thus having practical value.Furthermore, the participant of the blockchain network has a unique identity over the world, which ensures high security during trading. Furthermore, the participant of the blockchain network has a unique identity over the world, which ensures high security during trading.
区块链作为一种创新的信息技术,结合了去中心化、不变性、数据来源和合同自动操作的优势,可以解决电力交易中单点故障、交易成本高、有效性低和数据潜在风险等问题。然而,在传统的电力区块链中,区块链中的功能组件的设计,如区块的数据结构,没有考虑到电力的实际特征,从而导致实际应用中的性能瓶颈。基于电力交易的业务特点,提出了联盟区块链中以用户为中心的数据模型UCDM,以实现高效的数据存储和快速的数据检索。所提出的UCDM是在考虑事务检索和分析需求的基础上设计的,从而支持并发数据请求和海量数据存储的需求。每个用户的ID将在区块链上独立形成自己的链。与传统的数据模型相比,大量的实验结果表明,所提出的UCDM具有更短的处理延迟、更高的吞吐量和更短的响应延迟,具有实用价值。此外,区块链网络的参与者在世界各地拥有独特的身份,这确保了交易过程中的高度安全性。此外,区块链网络的参与者在世界各地拥有独特的身份,这确保了交易过程中的高度安全性。
{"title":"UCDM: A User-Centric Data Model in Power Blockchain","authors":"Zhixing Lv, Hui Yu, Kai Kang, Teng Chang Li, Guo Li Du","doi":"10.2174/2666255816666230112165555","DOIUrl":"https://doi.org/10.2174/2666255816666230112165555","url":null,"abstract":"\u0000\u0000As innovative information technology, blockchain has combined the advantages of decentralization, immutability, data provenance, and contract operation automatically, which can be used to solve the issues of single point failure, high trading cost, low effectiveness, and data potential risk in power trading. However, in the traditional power blockchain, the design of functional components in blockchain, such as the data structure of the block, does not take the actual features of power into account, thus leading to a performance bottleneck in practical application. Motivated by business characteristics of power trading, a user-centric data model UCDM in consortium blockchain is proposed to achieve efficient data storage and quick data retrieval.\u0000\u0000\u0000\u0000The proposed UCDM is designed by considering the requirements of transaction retrieval and analysis, thus supporting the requirements of concurrent data requests and mass data storage. The ID of each user will independently form its own chain over the blockchain.\u0000\u0000\u0000\u0000Compared with the traditional data model, the extensive experimental results demonstrate that the proposed UCDM has shorter processing delay, higher throughput, and shorter response latency, thus having practical value.\u0000\u0000\u0000\u0000Furthermore, the participant of the blockchain network has a unique identity over the world, which ensures high security during trading. Furthermore, the participant of the blockchain network has a unique identity over the world, which ensures high security during trading.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46856162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Recent Advances in Computer Science and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1