首页 > 最新文献

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications最新文献

英文 中文
Multi – Robot Exploration Supported by Enhanced Localization with Reduction of Localization Error Using Particle Swarm Optimization 利用粒子群优化降低定位误差,增强定位功能支持多机器人探索
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.014
M. Rajesh, S.R. Nagaraja, P. Suja
Exploration of an area by a group of robots is an active research field of robotics as multi-robot exploration is applied extensively in several real life scenarios. The major challenges in such exploration are the availability of communication infrastructure as communication plays a key role in the coordination of team of robots for effective coverage of the area under exploration. But in disaster affected scenarios, there will be no existing communication infrastructure available and this makes the exploration ineffective and time consuming. Another challenge is in the localization process each robot is carrying out to update the map as well as for exchange of information with other robots. In this paper, an enhanced Multi-robot exploration strategy is introduced. The base of the exploration strategy is two techniques. The first one being localization of each robot involved in the exploration and this is done with the help of trilateration where three anchors are required which will be setup before the exploration starts. The second part is navigation and avoiding overlapping or missing out sectors while exploring. This is done with help of a navigation policy called frontier cell based approach. Further to this, the exploration strategy is supported with localization error reduction scheme in which the localization error is reduced with the help of Particle Swarm Optimization (PSO). The entire scheme is simulated and exploration time is analyzed for the same environment in different obstacle density and different number of robots to perform exploration. The results show the scheme is better than many existing multi-robot exploration strategies. Precisely, the proposed scheme is able to reduce the localization error to a threshold level of 0.02cm or below which can be considered as novel contribution towards the exploration strategies.
由一组机器人进行区域探索是机器人学的一个活跃研究领域,因为多机器人探索被广泛应用于现实生活中的多个场景。这种探索的主要挑战是通信基础设施的可用性,因为通信在协调机器人团队有效覆盖探索区域方面发挥着关键作用。但在受灾害影响的场景中,没有现成的通信基础设施可用,这就使得探索变得无效和耗时。另一个挑战是每个机器人在更新地图和与其他机器人交换信息时所进行的定位过程。本文介绍了一种增强型多机器人探索策略。探索策略的基础是两种技术。第一项技术是对参与探索的每个机器人进行定位,这需要在探索开始前设置三个锚点。第二部分是导航,在探索过程中避免重叠或遗漏区域。这需要借助一种名为 "基于前沿单元的方法 "的导航策略。此外,探索策略还得到了定位误差减少方案的支持,在该方案中,利用粒子群优化(PSO)减少了定位误差。对整个方案进行了模拟,并分析了在不同障碍物密度和不同机器人数量的相同环境下进行探索所需的时间。结果表明,该方案优于许多现有的多机器人探索策略。确切地说,所提出的方案能够将定位误差降低到 0.02 厘米或以下的阈值水平,这可以被视为对探索策略的新贡献。
{"title":"Multi – Robot Exploration Supported by Enhanced Localization with Reduction of Localization Error Using Particle Swarm Optimization","authors":"M. Rajesh, S.R. Nagaraja, P. Suja","doi":"10.58346/jowua.2024.i1.014","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.014","url":null,"abstract":"Exploration of an area by a group of robots is an active research field of robotics as multi-robot exploration is applied extensively in several real life scenarios. The major challenges in such exploration are the availability of communication infrastructure as communication plays a key role in the coordination of team of robots for effective coverage of the area under exploration. But in disaster affected scenarios, there will be no existing communication infrastructure available and this makes the exploration ineffective and time consuming. Another challenge is in the localization process each robot is carrying out to update the map as well as for exchange of information with other robots. In this paper, an enhanced Multi-robot exploration strategy is introduced. The base of the exploration strategy is two techniques. The first one being localization of each robot involved in the exploration and this is done with the help of trilateration where three anchors are required which will be setup before the exploration starts. The second part is navigation and avoiding overlapping or missing out sectors while exploring. This is done with help of a navigation policy called frontier cell based approach. Further to this, the exploration strategy is supported with localization error reduction scheme in which the localization error is reduced with the help of Particle Swarm Optimization (PSO). The entire scheme is simulated and exploration time is analyzed for the same environment in different obstacle density and different number of robots to perform exploration. The results show the scheme is better than many existing multi-robot exploration strategies. Precisely, the proposed scheme is able to reduce the localization error to a threshold level of 0.02cm or below which can be considered as novel contribution towards the exploration strategies.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"39 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140366862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects of Augmented Reality based Dual-Task Proprioceptive Training on Postural Stability, Positioning Sensation and Cognition 基于增强现实技术的双任务体位感觉训练对姿势稳定性、定位感觉和认知的影响
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.007
Hyun Woo Song, Jaeho Yu
This study compared augmented reality (AR)-based proprioception training to traditional therapy to determine if the two tasks together were effective in improving postural stability, proprioception, and cognition. Forty-five healthy adults in their 20s were randomized into three groups: AR-based DT, AR-based proprioceptive exercise, and therapist-supervised exercise. Paired t-test and independent t-test were used to determine the within and between group effects, and the three groups were subjected to one-way ANOVA and Bonferroni's post hoc analysis. For postural stability, stability index and postural stability improved post-intervention in all groups (p<.05), with no differences between groups (p>.05). positioning sensation improved in all groups (p<.05), with no difference between groups (p>.05). Cognitive parameters showed significant differences in recognition and calculation in all groups after the intervention (p<.05), and no significant differences in ordering (p<.05). Thus, AR-based interventions have shown similar effects to therapists, improving cognitive performance on both tasks, and can be selected in some cases.
这项研究将基于增强现实(AR)的本体感觉训练与传统疗法进行了比较,以确定这两项任务结合在一起是否能有效改善姿势稳定性、本体感觉和认知能力。45 名 20 多岁的健康成年人被随机分为三组:基于 AR 的 DT 组、基于 AR 的本体感觉训练组和治疗师指导的训练组。采用配对 t 检验和独立 t 检验来确定组内和组间效应,并对三组进行单因素方差分析和 Bonferroni 事后分析。在姿势稳定性方面,所有组的稳定性指数和姿势稳定性在干预后都有所改善(P.05)。认知参数显示,干预后各组在识别和计算方面均有显著差异(P<.05),而在排序方面无显著差异(P<.05)。因此,基于增强现实技术的干预显示出与治疗师相似的效果,提高了这两项任务的认知表现,在某些情况下可以选用。
{"title":"Effects of Augmented Reality based Dual-Task Proprioceptive Training on Postural Stability, Positioning Sensation and Cognition","authors":"Hyun Woo Song, Jaeho Yu","doi":"10.58346/jowua.2024.i1.007","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.007","url":null,"abstract":"This study compared augmented reality (AR)-based proprioception training to traditional therapy to determine if the two tasks together were effective in improving postural stability, proprioception, and cognition. Forty-five healthy adults in their 20s were randomized into three groups: AR-based DT, AR-based proprioceptive exercise, and therapist-supervised exercise. Paired t-test and independent t-test were used to determine the within and between group effects, and the three groups were subjected to one-way ANOVA and Bonferroni's post hoc analysis. For postural stability, stability index and postural stability improved post-intervention in all groups (p<.05), with no differences between groups (p>.05). positioning sensation improved in all groups (p<.05), with no difference between groups (p>.05). Cognitive parameters showed significant differences in recognition and calculation in all groups after the intervention (p<.05), and no significant differences in ordering (p<.05). Thus, AR-based interventions have shown similar effects to therapists, improving cognitive performance on both tasks, and can be selected in some cases.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"40 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140368278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Framework of Educational Data Mining to Predict Student Learning Performance 预测学生学习成绩的教育数据挖掘新框架
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.009
Dr. Agung Triayudi, Rima Tamara Aldisa, S. Sumiati
Educational systems designed to meet the needs of academic advisors about adaptive learning will always be an essential issue, as this will be the beginning of the development of intelligent learning methods. In an educational institution, such as in a university environment, academic guidance carried out by a teacher to his students significantly affects the student's performance in the lecture stage, where educational guidance that goes poorly is allegedly causing difficulties for the student in carrying out his studies, or worst chance of dropping out of school. Therefore, this study aims to explore the potential and capabilities contained in the features of Educational Data Mining to predict students' learning performance which will later present various recommendations for academic guidance methods based on data analysis related to academic records and social and economic related data. In this study, we will propose data analysis and testing from recorded student data in an information technology class from a private university in Jakarta. The modelling presented in this study uses the Decision Tree, Neural Networks, and Naïve Bayes methods, which then implement these algorithms on academic data from 300 students of the 2017-2019 and 2018-2020 Information Systems and Informatics study program. From the implementation of data mining techniques in this study, performance results were obtained, which stated that the designed framework provided accurate predictions related to student performance.
为满足学术顾问对适应性学习的需求而设计的教育系统始终是一个重要问题,因为这将是智能学习方法发展的开端。在教育机构中,例如在大学环境中,教师对学生进行的学业指导在很大程度上影响着学生在授课阶段的表现,据称,学业指导不力会给学生的学业造成困难,最严重的可能会导致学生辍学。因此,本研究旨在探索教育数据挖掘功能在预测学生学习成绩方面所蕴含的潜力和能力,随后将根据学业记录和社会经济相关数据分析,为学业指导方法提出各种建议。在本研究中,我们将对雅加达一所私立大学信息技术班的学生数据进行分析和测试。本研究中提出的建模使用决策树、神经网络和奈伊贝叶斯方法,然后将这些算法应用于 2017-2019 学年和 2018-2020 学年信息系统与信息学专业 300 名学生的学业数据。通过在本研究中实施数据挖掘技术,获得了绩效结果,结果表明所设计的框架提供了与学生绩效相关的准确预测。
{"title":"New Framework of Educational Data Mining to Predict Student Learning Performance","authors":"Dr. Agung Triayudi, Rima Tamara Aldisa, S. Sumiati","doi":"10.58346/jowua.2024.i1.009","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.009","url":null,"abstract":"Educational systems designed to meet the needs of academic advisors about adaptive learning will always be an essential issue, as this will be the beginning of the development of intelligent learning methods. In an educational institution, such as in a university environment, academic guidance carried out by a teacher to his students significantly affects the student's performance in the lecture stage, where educational guidance that goes poorly is allegedly causing difficulties for the student in carrying out his studies, or worst chance of dropping out of school. Therefore, this study aims to explore the potential and capabilities contained in the features of Educational Data Mining to predict students' learning performance which will later present various recommendations for academic guidance methods based on data analysis related to academic records and social and economic related data. In this study, we will propose data analysis and testing from recorded student data in an information technology class from a private university in Jakarta. The modelling presented in this study uses the Decision Tree, Neural Networks, and Naïve Bayes methods, which then implement these algorithms on academic data from 300 students of the 2017-2019 and 2018-2020 Information Systems and Informatics study program. From the implementation of data mining techniques in this study, performance results were obtained, which stated that the designed framework provided accurate predictions related to student performance.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"56 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140365899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human-Centric AI : Enhancing User Experience through Natural Language Interfaces 以人为本的人工智能:通过自然语言界面提升用户体验
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.012
Dr. Walaa Saber Ismail
AI has significantly altered the way humans interact with technology. It is important to observe the impact of Natural Language Interfaces (NLIs) on user experiences in Human-Centric AI across various industries. Therefore, we specifically focus on the influence of Human-Centric AI and user interactions within AI chatbots in the United Arab Emirates (UAE). The aim of this study is to assess the factors that influence the acceptance of AI, examine its practical implications across different industries, and offer valuable insights for the responsible development of AI. A quantitative survey methodology was employed, involving 230 participants in the UAE. The research design, data collection, and analysis followed the Unified Theory of Acceptance and Use of Technology (UTAUT) model, which emphasizes performance expectancy, effort expectancy, social influence, and facilitating conditions. The survey encompassed a variety of participants from various organizations, with a majority expressing positive attitudes towards AI chatbots. The survey found that 80% of users agreed that AI systems improve task efficiency, 84% believe they help achieve goals, and 84% view them as practical. According to 75% of participants, the social impact is strongly influenced by AI chatbot system adoption. However, 80% understood the relevance of organizational infrastructure and favorable conditions. In particular, 72% of users stated that Natural Language Interfaces transform, indicating satisfactory user experiences. These features demonstrate the influence of Human-Centric AI adoption and its use in different organizations. Natural language interfaces play a critical role in improving human-centered AI user experiences, investigating theoretical issues and real-world applications, and providing guidance for the ethical use of AI.
人工智能极大地改变了人类与技术的交互方式。观察自然语言界面(NLI)对各行各业以人为本的人工智能用户体验的影响非常重要。因此,我们特别关注阿拉伯联合酋长国(UAE)人工智能聊天机器人中以人为中心的人工智能和用户交互的影响。本研究旨在评估影响人工智能接受度的因素,研究其对不同行业的实际影响,并为负责任地发展人工智能提供有价值的见解。本研究采用定量调查方法,涉及阿联酋的 230 名参与者。研究设计、数据收集和分析遵循技术接受和使用统一理论(UTAUT)模型,该模型强调性能预期、努力预期、社会影响和促进条件。调查涵盖了来自不同组织的各种参与者,大多数人对人工智能聊天机器人表达了积极的态度。调查发现,80% 的用户认为人工智能系统能提高任务效率,84% 的用户认为人工智能系统有助于实现目标,84% 的用户认为人工智能系统很实用。75%的参与者认为,人工智能聊天机器人系统的采用对社会影响很大。不过,80% 的人理解组织基础设施和有利条件的相关性。尤其是,72% 的用户表示,自然语言界面的转变表明用户体验令人满意。这些特点表明了以人为本的人工智能的采用及其在不同组织中的使用所产生的影响。自然语言界面在改善以人为本的人工智能用户体验、研究理论问题和实际应用以及为人工智能的道德使用提供指导方面发挥着至关重要的作用。
{"title":"Human-Centric AI : Enhancing User Experience through Natural Language Interfaces","authors":"Dr. Walaa Saber Ismail","doi":"10.58346/jowua.2024.i1.012","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.012","url":null,"abstract":"AI has significantly altered the way humans interact with technology. It is important to observe the impact of Natural Language Interfaces (NLIs) on user experiences in Human-Centric AI across various industries. Therefore, we specifically focus on the influence of Human-Centric AI and user interactions within AI chatbots in the United Arab Emirates (UAE). The aim of this study is to assess the factors that influence the acceptance of AI, examine its practical implications across different industries, and offer valuable insights for the responsible development of AI. A quantitative survey methodology was employed, involving 230 participants in the UAE. The research design, data collection, and analysis followed the Unified Theory of Acceptance and Use of Technology (UTAUT) model, which emphasizes performance expectancy, effort expectancy, social influence, and facilitating conditions. The survey encompassed a variety of participants from various organizations, with a majority expressing positive attitudes towards AI chatbots. The survey found that 80% of users agreed that AI systems improve task efficiency, 84% believe they help achieve goals, and 84% view them as practical. According to 75% of participants, the social impact is strongly influenced by AI chatbot system adoption. However, 80% understood the relevance of organizational infrastructure and favorable conditions. In particular, 72% of users stated that Natural Language Interfaces transform, indicating satisfactory user experiences. These features demonstrate the influence of Human-Centric AI adoption and its use in different organizations. Natural language interfaces play a critical role in improving human-centered AI user experiences, investigating theoretical issues and real-world applications, and providing guidance for the ethical use of AI.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"61 41","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140365029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks 调查关键基础设施网络安全的秘密、新挑战和最佳取证方法
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.008
B. Fakiha
As critical infrastructure networks become more interconnected and digitalized, they confront increased cyber threats fueled by the growing adoption of digitalized working and general operation methods around the world. This research delves into the complex topic of critical infrastructure network security by examining the hidden challenges and best forensic techniques used to safeguard these crucial systems. The study utilizes a comprehensive data collection approach that integrates an experiment and a case study to provide an in-depth understanding of this essential subject. It assesses the efficacy of various digital forensic procedures customized for critical infrastructure network protection by using meticulously designed experiments within controlled simulated environments. The findings highlight the wide range of challenges and threats that organizations tasked with maintaining and securing these networks encounter. The case study illuminates how forensic practices can be used in incident response and recovery situations. The results highlight the significance of a diversified approach to safeguarding critical infrastructure networks. They emphasize the need for modern methods and practices, such as blockchain technology and Artificial intelligence, by analyzing findings from the experiment and the case study.
随着关键基础设施网络的互联化和数字化程度越来越高,它们所面临的网络威胁也越来越大,而全球各地越来越多地采用数字化工作和一般操作方法,更是助长了这种威胁。本研究深入探讨了关键基础设施网络安全这一复杂课题,研究了用于保护这些关键系统的隐藏挑战和最佳取证技术。本研究采用了一种综合数据收集方法,将实验和案例研究相结合,以深入了解这一重要课题。它通过在受控模拟环境中使用精心设计的实验,评估了为关键基础设施网络保护定制的各种数字取证程序的功效。研究结果凸显了负责维护和保护这些网络的组织所遇到的各种挑战和威胁。案例研究阐明了如何在事件响应和恢复情况下使用取证实践。研究结果强调了采用多样化方法保护关键基础设施网络的重要性。通过分析实验和案例研究的结果,他们强调了现代方法和实践的必要性,如区块链技术和人工智能。
{"title":"Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks","authors":"B. Fakiha","doi":"10.58346/jowua.2024.i1.008","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.008","url":null,"abstract":"As critical infrastructure networks become more interconnected and digitalized, they confront increased cyber threats fueled by the growing adoption of digitalized working and general operation methods around the world. This research delves into the complex topic of critical infrastructure network security by examining the hidden challenges and best forensic techniques used to safeguard these crucial systems. The study utilizes a comprehensive data collection approach that integrates an experiment and a case study to provide an in-depth understanding of this essential subject. It assesses the efficacy of various digital forensic procedures customized for critical infrastructure network protection by using meticulously designed experiments within controlled simulated environments. The findings highlight the wide range of challenges and threats that organizations tasked with maintaining and securing these networks encounter. The case study illuminates how forensic practices can be used in incident response and recovery situations. The results highlight the significance of a diversified approach to safeguarding critical infrastructure networks. They emphasize the need for modern methods and practices, such as blockchain technology and Artificial intelligence, by analyzing findings from the experiment and the case study.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"6 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140365373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Business Management System for Improving QoS in Network Model 提高网络模型 QoS 的节能业务管理系统
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.004
Dr. Fernando Escobedo, Dr. Henry Bernardo Garay Canales, Fernando Willy Morillo Galarza, Dr. Carlos Miguel Aguilar Saldaña, Dr. Eddy Miguel Aguirre Reyes, Dr. César Augusto Flores Tananta
Assuring the safe and effective operation of a company's technological infrastructure is an essential part of business management. Monitoring, administering, and troubleshooting the many components and systems of the network are all part of the process. Additionally, it is the responsibility of business administrators to find methods to enhance the existing system, as well as to make certain that all resources are distributed in such a manner that their use may be maximized. Management of the business is a key component of the technological infrastructure of any organization, and it is of the utmost importance that it be carried out effectively in order to guarantee a safe and effective operation. It is essential for network operators to discover strategies to improve the energy efficiency of their networks without adversely affecting the quality of service (QoS) for reasons related to both cost and sustainability. In this research, an in-depth analysis of business management techniques for effective resource utilization is presented. This analysis begins with the design of the network and continues all the way through to the delivery of accurate data. An Energy Efficient Network (EEN) must be able to give programmability and flexibility to network infrastructures, as well as the ability to operate networks in a rapid way and provide operators with more control. It is impossible to ignore energy throughout the process of meeting the needs and requirements of network services, especially when taking into consideration the consequences on the long-term viability of both the environment and businesses. Energy efficiency in both current and future networks is the topic of discussion in this research. The findings indicate that energy efficient networks are successful in overcoming the present issues that stand in the way of the application of energy efficiency techniques, also the discussed model are effective in addressing some of the obstacles that are encountered by small and medium-sized businesses.
确保公司技术基础设施的安全有效运行是企业管理的重要组成部分。对网络的许多组件和系统进行监控、管理和故障排除都是这一过程的一部分。此外,企业管理者还有责任找到改进现有系统的方法,并确保所有资源的分配方式能够最大限度地发挥其作用。业务管理是任何组织的技术基础设施的关键组成部分,为了保证安全和有效的运行,最重要的是有效地进行业务管理。出于成本和可持续发展的考虑,网络运营商必须探索在不影响服务质量(QoS)的前提下提高网络能效的策略。本研究对有效利用资源的业务管理技术进行了深入分析。该分析从网络设计开始,一直持续到准确数据的传输。高能效网络(EEN)必须能够为网络基础设施提供可编程性和灵活性,以及快速运行网络和为运营商提供更多控制的能力。在满足网络服务需求和要求的整个过程中,不可能忽视能源,尤其是在考虑到对环境和企业长期生存能力的影响时。本研究讨论的主题是当前和未来网络的能源效率。研究结果表明,高能效网络能够成功克服目前阻碍能效技术应用的问题,而且所讨论的模式也能有效解决中小型企业遇到的一些障碍。
{"title":"Energy Efficient Business Management System for Improving QoS in Network Model","authors":"Dr. Fernando Escobedo, Dr. Henry Bernardo Garay Canales, Fernando Willy Morillo Galarza, Dr. Carlos Miguel Aguilar Saldaña, Dr. Eddy Miguel Aguirre Reyes, Dr. César Augusto Flores Tananta","doi":"10.58346/jowua.2024.i1.004","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.004","url":null,"abstract":"Assuring the safe and effective operation of a company's technological infrastructure is an essential part of business management. Monitoring, administering, and troubleshooting the many components and systems of the network are all part of the process. Additionally, it is the responsibility of business administrators to find methods to enhance the existing system, as well as to make certain that all resources are distributed in such a manner that their use may be maximized. Management of the business is a key component of the technological infrastructure of any organization, and it is of the utmost importance that it be carried out effectively in order to guarantee a safe and effective operation. It is essential for network operators to discover strategies to improve the energy efficiency of their networks without adversely affecting the quality of service (QoS) for reasons related to both cost and sustainability. In this research, an in-depth analysis of business management techniques for effective resource utilization is presented. This analysis begins with the design of the network and continues all the way through to the delivery of accurate data. An Energy Efficient Network (EEN) must be able to give programmability and flexibility to network infrastructures, as well as the ability to operate networks in a rapid way and provide operators with more control. It is impossible to ignore energy throughout the process of meeting the needs and requirements of network services, especially when taking into consideration the consequences on the long-term viability of both the environment and businesses. Energy efficiency in both current and future networks is the topic of discussion in this research. The findings indicate that energy efficient networks are successful in overcoming the present issues that stand in the way of the application of energy efficiency techniques, also the discussed model are effective in addressing some of the obstacles that are encountered by small and medium-sized businesses.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"62 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140366440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fingerprint Reconstruction: Approaches to Improve Fingerprint Images 指纹重建:改进指纹图像的方法
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.006
Milind Bhilavade, Dr.K.S. Shivaprakasha, Dr. Meenakshi R. Patil, D. L. Admuthe
Fingerprint reconstruction methods have been initially proposed to spoof the fingerprint identification systems, wherein the fingerprints are generated from the fingerprint features stored in the database for template matching/identification purpose. The reconstructed fingerprints attempt to validate in the absence of the user/person. The poor fingerprint Images with scratches on fingerprint image or latent fingerprints or overlapping fingerprints shall also be reconstructed for personality identification. In this paper we discuss the two fingerprint reconstruction methods, one which uses minutiae features for reconstruction and the other one uses deep learning methods to reconstruct the fingerprint images. The poor fingerprint image which fails to validate the identity due to various reasons like poor skin condition/large cuts on the fingers/wet fingers/poor scanning of images shall be reconstructed for increasing the matching accuracy. The requirement of performance measure parameters used for evaluation of these systems are equal error rate, false acceptance rate, false rejection rate and average matching score. The deep learning methods are more suitable for reconstructing the fingerprint images that appear damaged due to poor skin condition/large cuts on the fingers/wet fingers/poor scanning of images. In terms of matching score comparison, the deep learning methods have matching scores in between 23-94% whereas for minutiae-based techniques the matching score is between 82 and 99.99%. The other performance parameter is the equal error rate (ERR) required to meet has to be closer to 0. The matching score is computed with the assumptions of false acceptance rate (FAR) ranging from 1% to 0%.
指纹重建方法最初是为了欺骗指纹识别系统而提出的,其中指纹是根据数据库中存储的指纹特征生成的,用于模板匹配/识别目的。重建的指纹试图在用户/个人不在场的情况下进行验证。指纹图像上有划痕的不良指纹图像、潜伏指纹或重叠指纹也应被重建,以用于人格识别。在本文中,我们讨论了两种指纹重建方法,一种是利用细节特征重建指纹图像,另一种是利用深度学习方法重建指纹图像。由于皮肤状况不佳/手指上有大面积伤口/手指潮湿/图像扫描不佳等各种原因而导致无法验证身份的不良指纹图像应予以重建,以提高匹配准确率。用于评估这些系统的性能测量参数的要求是平均错误率、错误接受率、错误拒绝率和平均匹配得分。深度学习方法更适用于重建因皮肤状况不佳/手指上有大伤口/手指潮湿/图像扫描不佳而出现损坏的指纹图像。在匹配得分比较方面,深度学习方法的匹配得分在 23% 到 94% 之间,而基于特征点的技术的匹配得分在 82% 到 99.99% 之间。另一个性能参数是要求达到的等效错误率(ERR)必须接近 0。
{"title":"Fingerprint Reconstruction: Approaches to Improve Fingerprint Images","authors":"Milind Bhilavade, Dr.K.S. Shivaprakasha, Dr. Meenakshi R. Patil, D. L. Admuthe","doi":"10.58346/jowua.2024.i1.006","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.006","url":null,"abstract":"Fingerprint reconstruction methods have been initially proposed to spoof the fingerprint identification systems, wherein the fingerprints are generated from the fingerprint features stored in the database for template matching/identification purpose. The reconstructed fingerprints attempt to validate in the absence of the user/person. The poor fingerprint Images with scratches on fingerprint image or latent fingerprints or overlapping fingerprints shall also be reconstructed for personality identification. In this paper we discuss the two fingerprint reconstruction methods, one which uses minutiae features for reconstruction and the other one uses deep learning methods to reconstruct the fingerprint images. The poor fingerprint image which fails to validate the identity due to various reasons like poor skin condition/large cuts on the fingers/wet fingers/poor scanning of images shall be reconstructed for increasing the matching accuracy. The requirement of performance measure parameters used for evaluation of these systems are equal error rate, false acceptance rate, false rejection rate and average matching score. The deep learning methods are more suitable for reconstructing the fingerprint images that appear damaged due to poor skin condition/large cuts on the fingers/wet fingers/poor scanning of images. In terms of matching score comparison, the deep learning methods have matching scores in between 23-94% whereas for minutiae-based techniques the matching score is between 82 and 99.99%. The other performance parameter is the equal error rate (ERR) required to meet has to be closer to 0. The matching score is computed with the assumptions of false acceptance rate (FAR) ranging from 1% to 0%.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"41 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140366695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Medical Application of Deep Learning (MUNet) for Detection of COVID-19 from Chest Images 利用深度学习(MUNet)从胸部图像中检测 COVID-19 的智能医疗应用
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.010
Ahmad AL Smadi, Dr. Ahed Abugabah, Mutasem K. Al-smadi, A. Al-Smadi
Fighting the outbreak of COVID-19 is now one of humanity's most critical matters. Rapid detection and isolation of infected people are crucial for decelerating the disease's spread. Due to the pandemic, the conventional technique for COVID-19 detection, reverse transcription-polymerase chain reaction, is time-consuming and in small abundance. Therefore, studies have been searching for alternate methods for detecting COVID-19, and thus applying deep learning methods to patients' chest images has been rendering impressive performance. The primary objective of this study is to suggest a technique for COVID-19 detection in chest images that is both efficient and reliable. We propose a deep learning method for COVID-19 classification based on a modified UNet called (Covid-MUNet). The Covid-MUNet model is trained using publicly available datasets, including chest X-ray images for multi-class classification (3-class and 4-classes) and CT scans images for binary/multi-class classification (2-classes and 3-classes). Using chest images, the Covid-MUNet is a successful methodology that helps physicians rapidly identify patients with COVID-19, thereby delaying the fast spread of COVID-19. The proposed model achieved an overall accuracy of 97.44% in classifying three categories (COVID-19, Normal, and Pneumonia) and an accuracy of 96.57% in classifying two categories (COVID-19 and Normal).
抗击 COVID-19 的爆发是人类目前最重要的任务之一。快速检测和隔离感染者对于减缓疾病传播至关重要。由于疫情的流行,COVID-19 的常规检测技术--反转录聚合酶链反应--耗时长且数量少。因此,研究人员一直在寻找检测 COVID-19 的替代方法,因此,将深度学习方法应用于患者胸部图像的效果令人印象深刻。本研究的主要目的是提出一种既高效又可靠的胸部图像 COVID-19 检测技术。我们提出了一种基于名为(Covid-MUNet)的改进 UNet 的 COVID-19 分类深度学习方法。Covid-MUNet 模型使用公开可用的数据集进行训练,包括用于多类分类(3 类和 4 类)的胸部 X 光图像和用于二元/多类分类(2 类和 3 类)的 CT 扫描图像。利用胸部图像,Covid-MUNet 是一种成功的方法,可帮助医生快速识别 COVID-19 患者,从而延缓 COVID-19 的快速传播。所提出的模型在三类(COVID-19、正常和肺炎)分类中的总体准确率达到 97.44%,在两类(COVID-19 和正常)分类中的准确率达到 96.57%。
{"title":"Smart Medical Application of Deep Learning (MUNet) for Detection of COVID-19 from Chest Images","authors":"Ahmad AL Smadi, Dr. Ahed Abugabah, Mutasem K. Al-smadi, A. Al-Smadi","doi":"10.58346/jowua.2024.i1.010","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.010","url":null,"abstract":"Fighting the outbreak of COVID-19 is now one of humanity's most critical matters. Rapid detection and isolation of infected people are crucial for decelerating the disease's spread. Due to the pandemic, the conventional technique for COVID-19 detection, reverse transcription-polymerase chain reaction, is time-consuming and in small abundance. Therefore, studies have been searching for alternate methods for detecting COVID-19, and thus applying deep learning methods to patients' chest images has been rendering impressive performance. The primary objective of this study is to suggest a technique for COVID-19 detection in chest images that is both efficient and reliable. We propose a deep learning method for COVID-19 classification based on a modified UNet called (Covid-MUNet). The Covid-MUNet model is trained using publicly available datasets, including chest X-ray images for multi-class classification (3-class and 4-classes) and CT scans images for binary/multi-class classification (2-classes and 3-classes). Using chest images, the Covid-MUNet is a successful methodology that helps physicians rapidly identify patients with COVID-19, thereby delaying the fast spread of COVID-19. The proposed model achieved an overall accuracy of 97.44% in classifying three categories (COVID-19, Normal, and Pneumonia) and an accuracy of 96.57% in classifying two categories (COVID-19 and Normal).","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"19 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140368363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Software Infrastructures for Enhanced Learning Environments to Empowering Education 探索强化学习环境的软件基础设施以增强教育能力
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.016
Ronald M. Hernández, Dr. Walter Antonio Campos Ugaz, Dr. Segundo Juan Sanchez Tarrillo, Dr. Silvia Josefina Aguinaga Vasquez, Sara Esther Liza Ordoñez, Ronald Avellaneda Montenegro, Dr. Dora Elisa Elías Martínez, Dr. Doris E. Fuster- Guillen
Recently, the education sector has undergone a notable change due to the incorporation of technology, resulting in the emergence of Educational Technology (EdTech). This new trend has completely transformed the learning process for students, teaching methods for educators, and operations of educational institutions. Due to EdTech, education has become simpler to access, engaging, and efficient, providing customized and diverse learning experiences. This article explores into the significant influence of EdTech on the field of education and the promising opportunities it offers for the future. EdTech has become a significant enabler, allowing institutions to meet evolving student needs and cultivate new skillsets without being limited by geographical barriers. EdTech integrates digital and technological media with conventional methods of instruction to enable various forms of learning, offering adaptability, enhancing engagement, and providing high-quality educational solutions. EdTech tools empower educators to track student engagement, encourage interactive and creative learning experiences, and stand for human-centred education focusing on critical thinking, innovation, and entrepreneurial activity. Exploring deeper relationships between educational data as well as predicting how well students do in school has been made possible through educational data mining. Presented is a novel model utilizing machine learning computational methods to forecast the EdTech for the students by using their midterm exam results. Various machine learning algorithms were assessed and providing the EdTech for improving their performance in final exam. This study comprehensively examines different EdTech technologies and recommend a unified model that could serve as a solid framework for classroom teaching.
最近,由于技术的融入,教育领域发生了显著变化,教育技术(EdTech)应运而生。这一新趋势彻底改变了学生的学习过程、教育工作者的教学方法和教育机构的运作。由于教育技术的出现,教育变得更加简单易懂、引人入胜和高效,并提供了定制化和多样化的学习体验。本文探讨了教育技术对教育领域的重大影响,以及它为未来提供的充满希望的机遇。教育技术已成为一个重要的推动因素,使教育机构能够满足不断变化的学生需求,培养新的技能组合,而不受地理障碍的限制。教育技术将数字和技术媒体与传统教学方法相结合,实现各种形式的学习,提供适应性,提高参与度,并提供高质量的教育解决方案。教育技术工具使教育工作者有能力跟踪学生的参与情况,鼓励互动和创造性的学习体验,倡导以人为本的教育,注重批判性思维、创新和创业活动。通过教育数据挖掘,探索教育数据之间的深层关系以及预测学生在学校的表现成为可能。本文介绍的是一个利用机器学习计算方法的新模型,通过学生的期中考试成绩来预测他们的教育技术水平。对各种机器学习算法进行了评估,并为提高期末考试成绩提供了教育技术。这项研究全面考察了不同的教育技术,并推荐了一个统一的模型,可作为课堂教学的坚实框架。
{"title":"Exploring Software Infrastructures for Enhanced Learning Environments to Empowering Education","authors":"Ronald M. Hernández, Dr. Walter Antonio Campos Ugaz, Dr. Segundo Juan Sanchez Tarrillo, Dr. Silvia Josefina Aguinaga Vasquez, Sara Esther Liza Ordoñez, Ronald Avellaneda Montenegro, Dr. Dora Elisa Elías Martínez, Dr. Doris E. Fuster- Guillen","doi":"10.58346/jowua.2024.i1.016","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.016","url":null,"abstract":"Recently, the education sector has undergone a notable change due to the incorporation of technology, resulting in the emergence of Educational Technology (EdTech). This new trend has completely transformed the learning process for students, teaching methods for educators, and operations of educational institutions. Due to EdTech, education has become simpler to access, engaging, and efficient, providing customized and diverse learning experiences. This article explores into the significant influence of EdTech on the field of education and the promising opportunities it offers for the future. EdTech has become a significant enabler, allowing institutions to meet evolving student needs and cultivate new skillsets without being limited by geographical barriers. EdTech integrates digital and technological media with conventional methods of instruction to enable various forms of learning, offering adaptability, enhancing engagement, and providing high-quality educational solutions. EdTech tools empower educators to track student engagement, encourage interactive and creative learning experiences, and stand for human-centred education focusing on critical thinking, innovation, and entrepreneurial activity. Exploring deeper relationships between educational data as well as predicting how well students do in school has been made possible through educational data mining. Presented is a novel model utilizing machine learning computational methods to forecast the EdTech for the students by using their midterm exam results. Various machine learning algorithms were assessed and providing the EdTech for improving their performance in final exam. This study comprehensively examines different EdTech technologies and recommend a unified model that could serve as a solid framework for classroom teaching.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"52 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140367869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Implementation of a Network Function for Real-time False Base Station Detection for the Next Generation Mobile Communication Environment 为下一代移动通信环境实时检测虚假基站的网络功能实现研究
Q1 Computer Science Pub Date : 2024-03-29 DOI: 10.58346/jowua.2024.i1.013
Daehyeon Son, Youngshin Park, Bonam Kim, Ilsun You
The threat posed by false base stations remains pertinent across the 4G, 5G, and forthcoming 6G generations of mobile communication. In response, this paper introduces a real-time detection method for false base stations employing two approaches: machine learning and specification-based. Utilizing the UERANSIM open 5G RAN (Radio-Access Network) test platform, we assess the feasibility and practicality of applying these techniques within a 5G network environment. Emulating real-world 5G conditions, we implement a functional split in the 5G base station and deploy the False Base Station Detection Function (FDF) as a 5G NF (Network Function) within the CU (Central Unit). This setup enables real-time detection seamlessly integrated into the network. Experimental results indicate that specification-based detection outperforms machine learning, achieving a detection accuracy of 99.6% compared to 96.75% for the highest-performing machine learning model XGBoost. Furthermore, specification-based detection demonstrates superior efficiency, with CPU usage of 1.2% and memory usage of 16.12MB, compared to 1.6% CPU usage and 182.4MB memory usage for machine learning on average. Consequently, the implementation of specification-based detection using the proposed method emerges as the most effective technique in the 5G environment.
在 4G、5G 和即将到来的 6G 移动通信时代,伪基站带来的威胁依然存在。为此,本文介绍了一种实时检测伪基站的方法,采用了两种方法:机器学习和基于规范。利用 UERANSIM 开放式 5G RAN(无线接入网络)测试平台,我们评估了在 5G 网络环境中应用这些技术的可行性和实用性。模拟真实世界的 5G 条件,我们在 5G 基站中实施了功能拆分,并将虚假基站检测功能 (FDF) 作为 5G NF(网络功能)部署在 CU(中央单元)中。这种设置可将实时检测无缝集成到网络中。实验结果表明,基于规范的检测性能优于机器学习,检测准确率达到 99.6%,而性能最高的机器学习模型 XGBoost 的检测准确率为 96.75%。此外,基于规范的检测还表现出更高的效率,CPU 使用率为 1.2%,内存使用量为 16.12MB,而机器学习的 CPU 使用率平均为 1.6%,内存使用量平均为 182.4MB。因此,在 5G 环境中,使用所提出的方法实施基于规范的检测是最有效的技术。
{"title":"A Study on the Implementation of a Network Function for Real-time False Base Station Detection for the Next Generation Mobile Communication Environment","authors":"Daehyeon Son, Youngshin Park, Bonam Kim, Ilsun You","doi":"10.58346/jowua.2024.i1.013","DOIUrl":"https://doi.org/10.58346/jowua.2024.i1.013","url":null,"abstract":"The threat posed by false base stations remains pertinent across the 4G, 5G, and forthcoming 6G generations of mobile communication. In response, this paper introduces a real-time detection method for false base stations employing two approaches: machine learning and specification-based. Utilizing the UERANSIM open 5G RAN (Radio-Access Network) test platform, we assess the feasibility and practicality of applying these techniques within a 5G network environment. Emulating real-world 5G conditions, we implement a functional split in the 5G base station and deploy the False Base Station Detection Function (FDF) as a 5G NF (Network Function) within the CU (Central Unit). This setup enables real-time detection seamlessly integrated into the network. Experimental results indicate that specification-based detection outperforms machine learning, achieving a detection accuracy of 99.6% compared to 96.75% for the highest-performing machine learning model XGBoost. Furthermore, specification-based detection demonstrates superior efficiency, with CPU usage of 1.2% and memory usage of 16.12MB, compared to 1.6% CPU usage and 182.4MB memory usage for machine learning on average. Consequently, the implementation of specification-based detection using the proposed method emerges as the most effective technique in the 5G environment.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"59 17","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140365099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1