首页 > 最新文献

Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications最新文献

英文 中文
Enhancing the Lifetime of WSN Using a Modified Ant Colony Optimization Algorithm 一种改进蚁群优化算法提高WSN的生存期
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.011
Belal K. Elfarra, Mamoun A. Salha, Raed S. Rasheed, Jehad Aldahdooh, Aiman Ahmed AbuSamra
Wireless sensor networks (WSNs) have been extensively used in various fields, such as health, defense, education, and industrial applications, to collect and transmit environmental data to the base station. However, energy efficiency is a significant challenge in WSNs, as data transmission is typically limited to a single route, leading to excessive energy consumption by the nodes along that route. This can lead to a decrease in the network's overall efficiency and effectiveness. To address this issue, this study aims to extend the lifespan of WSNs by optimizing route selection based on three variables: residual node energy, distance to the base station, and number of shared neighbors. In this paper, the authors propose three systematic approaches, namely Energy-Aware ACO Routing (EACO), Cost-Effective ACO Routing (CEACO), and Cost-Efficient Node Replacement Strategies ACO (CERACO), to enhance the lifetime of WSNs. These approaches consider various factors such as cost, energy consumption, replacement, and reliability. The paper provides a practical guide for researchers and practitioners to overcome the challenges related to energy efficiency and cost-effectiveness in WSNs. Experimental results demonstrate that the first dead node occurs later with the proposed methods than with the traditional Ant Colony Optimization (ACO) algorithm.
无线传感器网络(WSNs)广泛应用于卫生、国防、教育和工业等各个领域,用于收集环境数据并将其传输到基站。然而,在wsn中,能源效率是一个重大挑战,因为数据传输通常限于单一路由,导致沿该路由的节点消耗过多的能量。这可能导致网络整体效率和有效性的降低。为了解决这一问题,本研究旨在通过基于剩余节点能量、到基站的距离和共享邻居数量三个变量优化路由选择来延长wsn的寿命。本文提出了能量感知蚁群路由(EACO)、成本效益蚁群路由(CEACO)和成本效益节点替换策略蚁群路由(CERACO)三种系统方法来提高无线传感器网络的寿命。这些方法考虑了各种因素,如成本、能源消耗、替换和可靠性。本文为研究人员和从业人员克服无线传感器网络在能源效率和成本效益方面的挑战提供了实用指南。实验结果表明,与传统的蚁群优化算法相比,该算法的第一个死节点出现时间较晚。
{"title":"Enhancing the Lifetime of WSN Using a Modified Ant Colony Optimization Algorithm","authors":"Belal K. Elfarra, Mamoun A. Salha, Raed S. Rasheed, Jehad Aldahdooh, Aiman Ahmed AbuSamra","doi":"10.58346/jowua.2023.i3.011","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.011","url":null,"abstract":"Wireless sensor networks (WSNs) have been extensively used in various fields, such as health, defense, education, and industrial applications, to collect and transmit environmental data to the base station. However, energy efficiency is a significant challenge in WSNs, as data transmission is typically limited to a single route, leading to excessive energy consumption by the nodes along that route. This can lead to a decrease in the network's overall efficiency and effectiveness. To address this issue, this study aims to extend the lifespan of WSNs by optimizing route selection based on three variables: residual node energy, distance to the base station, and number of shared neighbors. In this paper, the authors propose three systematic approaches, namely Energy-Aware ACO Routing (EACO), Cost-Effective ACO Routing (CEACO), and Cost-Efficient Node Replacement Strategies ACO (CERACO), to enhance the lifetime of WSNs. These approaches consider various factors such as cost, energy consumption, replacement, and reliability. The paper provides a practical guide for researchers and practitioners to overcome the challenges related to energy efficiency and cost-effectiveness in WSNs. Experimental results demonstrate that the first dead node occurs later with the proposed methods than with the traditional Ant Colony Optimization (ACO) algorithm.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135038950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multidirectional Trust-Based Security Mechanisms for Sinkhole Attack Detection in the RPL Routing Protocol for Internet of Things 物联网RPL路由协议中基于信任的多方向天坑攻击检测安全机制
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.005
Sopha Khoeurt, Chakchai So-In, Pakarat Musikawan, Phet Aimtongkham
The Internet of Things (IoT) has gained popularity in recent years by connecting physical objects to the Internet, enabling innovative applications. To facilitate communication in low-power and lossy networks (LLNs), the IPv6-based routing protocol for LLNs (RPL) is widely used. However, RPL’s lack of specified security models makes it vulnerable to security threats, particularly sinkhole attacks. Existing sinkhole attack detection techniques suffer from high detection delays and false positives. To overcome these limitations, in our research we propose a multidirectional trust-based detection approach for sinkhole attacks in the RPL routing protocol. Our model introduces a novel architecture that considers trust in parent, child, and neighbor directions, reducing detection delays. We enhance detection efficiency and reduce false positives by combining fuzzy logic systems (FLSs) and subjective logic (SL). Additionally, we introduce a new trust weight variable derived from Shannon's entropy method and multiattribute utility theory. We adaptively adjust the SL coefficient based on network conditions, replacing the constant coefficient value of SL theory. Our approach is compared to the most recent techniques, and we assess different indicators, such as false-positive rate, false-negative rate, packet delivery ratio, throughput, average delay, and energy consumption. Our results demonstrate superior performance in all these metrics, highlighting the effectiveness of our approach.
近年来,物联网(IoT)通过将物理对象连接到互联网,从而实现创新应用而受到欢迎。为了方便低功耗、低损耗网络之间的通信,基于ipv6的路由协议RPL (routing protocol for lln)得到了广泛的应用。然而,RPL缺乏指定的安全模型,这使得它容易受到安全威胁,特别是天坑攻击。现有的天坑攻击检测技术存在检测延迟和误报的问题。为了克服这些限制,在我们的研究中,我们提出了一种针对RPL路由协议中的陷坑攻击的基于信任的多向检测方法。我们的模型引入了一种新的架构,它考虑了对父、子和邻居方向的信任,从而减少了检测延迟。我们将模糊逻辑系统(FLSs)和主观逻辑(SL)相结合,提高了检测效率,减少了误报。此外,我们引入了一个由香农熵法和多属性效用理论导出的新的信任权变量。我们根据网络情况自适应调整SL系数,取代了SL理论的常系数值。我们的方法与最新的技术进行了比较,我们评估了不同的指标,如假阳性率、假阴性率、数据包传输比、吞吐量、平均延迟和能耗。我们的结果在所有这些指标中都显示出卓越的表现,突出了我们方法的有效性。
{"title":"Multidirectional Trust-Based Security Mechanisms for Sinkhole Attack Detection in the RPL Routing Protocol for Internet of Things","authors":"Sopha Khoeurt, Chakchai So-In, Pakarat Musikawan, Phet Aimtongkham","doi":"10.58346/jowua.2023.i3.005","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.005","url":null,"abstract":"The Internet of Things (IoT) has gained popularity in recent years by connecting physical objects to the Internet, enabling innovative applications. To facilitate communication in low-power and lossy networks (LLNs), the IPv6-based routing protocol for LLNs (RPL) is widely used. However, RPL’s lack of specified security models makes it vulnerable to security threats, particularly sinkhole attacks. Existing sinkhole attack detection techniques suffer from high detection delays and false positives. To overcome these limitations, in our research we propose a multidirectional trust-based detection approach for sinkhole attacks in the RPL routing protocol. Our model introduces a novel architecture that considers trust in parent, child, and neighbor directions, reducing detection delays. We enhance detection efficiency and reduce false positives by combining fuzzy logic systems (FLSs) and subjective logic (SL). Additionally, we introduce a new trust weight variable derived from Shannon's entropy method and multiattribute utility theory. We adaptively adjust the SL coefficient based on network conditions, replacing the constant coefficient value of SL theory. Our approach is compared to the most recent techniques, and we assess different indicators, such as false-positive rate, false-negative rate, packet delivery ratio, throughput, average delay, and energy consumption. Our results demonstrate superior performance in all these metrics, highlighting the effectiveness of our approach.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Optimization using PSO and K-Means Algorithm 基于PSO和K-Means算法的数据优化
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.002
Abdul Rahmat, Ahmad Arif Nurrahman, Susatyo Adhi Pramono, Dadi Ahmadi, Winci Firdaus, Robbi Rahim
Tourism is one of the industries that contribute considerably to the country's economy. Tourism helps the country's economy expand by providing and increasing jobs, living standards, and triggering the rise of other tourist-related production. The tourism industry will become a multinational industry and the primary driver of the global economy in the twenty-first century. Tourism has generated significant foreign exchange for a number of countries. Indonesia, the world's biggest archipelagic country with 17,508 islands, often known as the archipelago or maritime country, has recognized the importance of the tourist sector to the Indonesian economy because tourism growth consistently outpaces economic growth. The research's goal is to map the number of tourist visits. The mapping is in the form of clusters based on countries. The technology utilized is classification data mining with the K-Means method and Particle Swarm Optimization (PSO). The dataset came from the Central Bureau of Statistics, a government organization (abbreviated as BPS). The research outcomes in cluster mapping, with the cluster results compared to standard K-Means and K-Means + PSO. RapidMiner software is used during the analytical process. The calculation results in the form of clusters will be evaluated using the Davies-Bouldin Index (DBI) parameter. The cluster value (k) used is k = 2, 3, 4, 5. The findings show that the K-Means + PSO optimization has the minimum DBI value for k = 5. Meanwhile, the DBI value for k = 5 is 0.134.
旅游业是对国家经济作出重大贡献的产业之一。旅游业通过提供和增加就业机会,提高生活水平,并引发其他与旅游相关的生产的增长,帮助国家经济扩张。旅游业将成为一个跨国产业,成为21世纪全球经济的主要驱动力。旅游业为一些国家创造了可观的外汇。印度尼西亚是世界上最大的群岛国家,拥有17508个岛屿,通常被称为群岛国家或海洋国家,它已经认识到旅游业对印尼经济的重要性,因为旅游业的增长一直超过经济增长。这项研究的目的是绘制出游客访问量的地图。地图是以基于国家的集群的形式呈现的。所采用的技术是基于k -均值方法和粒子群算法的分类数据挖掘。该数据集来自政府机构中央统计局(简称BPS)。将研究成果进行聚类映射,将聚类结果与标准K-Means和K-Means + PSO进行比较。在分析过程中使用RapidMiner软件。以聚类形式计算的结果将使用Davies-Bouldin Index (DBI)参数进行评估。使用的聚类值(k)为k = 2,3,4,5。结果表明,k = 5时,k - means + PSO优化的DBI值最小。同时,k = 5时DBI值为0.134。
{"title":"Data Optimization using PSO and K-Means Algorithm","authors":"Abdul Rahmat, Ahmad Arif Nurrahman, Susatyo Adhi Pramono, Dadi Ahmadi, Winci Firdaus, Robbi Rahim","doi":"10.58346/jowua.2023.i3.002","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.002","url":null,"abstract":"Tourism is one of the industries that contribute considerably to the country's economy. Tourism helps the country's economy expand by providing and increasing jobs, living standards, and triggering the rise of other tourist-related production. The tourism industry will become a multinational industry and the primary driver of the global economy in the twenty-first century. Tourism has generated significant foreign exchange for a number of countries. Indonesia, the world's biggest archipelagic country with 17,508 islands, often known as the archipelago or maritime country, has recognized the importance of the tourist sector to the Indonesian economy because tourism growth consistently outpaces economic growth. The research's goal is to map the number of tourist visits. The mapping is in the form of clusters based on countries. The technology utilized is classification data mining with the K-Means method and Particle Swarm Optimization (PSO). The dataset came from the Central Bureau of Statistics, a government organization (abbreviated as BPS). The research outcomes in cluster mapping, with the cluster results compared to standard K-Means and K-Means + PSO. RapidMiner software is used during the analytical process. The calculation results in the form of clusters will be evaluated using the Davies-Bouldin Index (DBI) parameter. The cluster value (k) used is k = 2, 3, 4, 5. The findings show that the K-Means + PSO optimization has the minimum DBI value for k = 5. Meanwhile, the DBI value for k = 5 is 0.134.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Annotation Based Mechanism for Web Service Discovery and Recommendation 基于语义标注的Web服务发现与推荐机制
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.013
J. Brindha Merin, Dr.W. Aisha Banu, Akila R., Radhika A.
Web Mining is regarded as one among the data mining techniques that aids in fetching and extraction of necessary data from the web. Conversely, Web usage mining discovers and extracts essential patterns usage over the webs which are being further utilized by various web applications. In order to discover and explore web services that are registered with documents of Web Services-Inspection, Discovery and Integration registry, Universal Description wants specific search circumstance similar to URL, category and service name. The document of Web Service Description Language (WSDL) offers a condition of the web services customers to take out operations, communications and the service format of right message. Therefore, WSDL is being utilized together with semantic explanation dependent substantiation for the extraction of different web services for related purpose, other supporting operations and attributes. The reason is that there subsist different web services having corresponding functionalities however altered or changeable attributes that are non–functional. Resultant, recognize the preeminent web service become tiresome for the user. A method is projected which caters the analysis of service resemblance with the aid of semantic annotation and machine learning (ML) algorithms depending on the analysis intended for enhancing the classification through capturing useful web services semantics related with real world. The emphasizes on the research technique of choosing preeminent web service for the user based on the semantic annotation. The research work in turn recommends a web mining technique that determines the best web service automatically thus ranking concepts in service textual documentation and classifies services on behalf of particular domains. Parallel computation is made easy with web services. The different management stages in the system of recommendation entail collection of dataset through WSDL on the semantic annotation basis, thereby recognizing the best service with the DOBT-Dynamic operation dependent discovering method, ranking through mechanisms MDBR - Multi-Dimensional based ranking, recommendation and classification. In this work, it has been employed a combination of fundamental ML estimators, namely Multinomial Naive Bayes (MNB) and Support Vector Machines (SVM), as well as ensemble techniques such as Bagging, Random Forests, and AdaBoost, to perform classification of Web services. It was observed from the investigate work that the adapted system of best web services recommendation defers high performance in contradiction of the existing recommendation technique regarding accuracy, efficiency in addition to processing time.
Web挖掘被认为是数据挖掘技术中的一种,它有助于从Web中获取和提取必要的数据。相反,Web使用挖掘发现和提取Web上使用的基本模式,这些模式被各种Web应用程序进一步利用。为了发现和探索在web服务检查、发现和集成注册中心文档中注册的web服务,通用描述需要类似于URL、类别和服务名称的特定搜索环境。Web服务描述语言(WSDL)的文档提供了Web服务客户进行操作、通信和正确消息的服务格式的条件。因此,WSDL与语义解释相关的证实一起被用于提取不同的web服务,用于相关目的、其他支持操作和属性。原因是存在不同的web服务,这些web服务具有相应的功能,但是改变或改变了非功能性的属性。结果,识别卓越的web服务对用户来说变得乏味。本文提出了一种基于语义注释和机器学习(ML)算法的服务相似性分析方法,该方法旨在通过捕获与现实世界相关的有用web服务语义来增强分类。重点研究了基于语义标注为用户选择优质web服务的技术。研究工作反过来推荐了一种web挖掘技术,该技术可以自动确定最佳web服务,从而对服务文本文档中的概念进行排序,并根据特定领域对服务进行分类。web服务使并行计算变得容易。推荐系统的不同管理阶段需要在语义标注的基础上通过WSDL收集数据集,从而通过dobt -动态操作依赖的发现方法识别最佳服务,通过MDBR -基于多维度的排序、推荐和分类机制进行排序。在这项工作中,它结合了基本的机器学习估计器,即多项朴素贝叶斯(MNB)和支持向量机(SVM),以及集成技术,如Bagging,随机森林和AdaBoost,来执行Web服务分类。从研究工作中可以看出,与现有推荐技术相比,改进后的最佳web服务推荐系统在准确率、效率和处理时间上都有较高的性能要求。
{"title":"Semantic Annotation Based Mechanism for Web Service Discovery and Recommendation","authors":"J. Brindha Merin, Dr.W. Aisha Banu, Akila R., Radhika A.","doi":"10.58346/jowua.2023.i3.013","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.013","url":null,"abstract":"Web Mining is regarded as one among the data mining techniques that aids in fetching and extraction of necessary data from the web. Conversely, Web usage mining discovers and extracts essential patterns usage over the webs which are being further utilized by various web applications. In order to discover and explore web services that are registered with documents of Web Services-Inspection, Discovery and Integration registry, Universal Description wants specific search circumstance similar to URL, category and service name. The document of Web Service Description Language (WSDL) offers a condition of the web services customers to take out operations, communications and the service format of right message. Therefore, WSDL is being utilized together with semantic explanation dependent substantiation for the extraction of different web services for related purpose, other supporting operations and attributes. The reason is that there subsist different web services having corresponding functionalities however altered or changeable attributes that are non–functional. Resultant, recognize the preeminent web service become tiresome for the user. A method is projected which caters the analysis of service resemblance with the aid of semantic annotation and machine learning (ML) algorithms depending on the analysis intended for enhancing the classification through capturing useful web services semantics related with real world. The emphasizes on the research technique of choosing preeminent web service for the user based on the semantic annotation. The research work in turn recommends a web mining technique that determines the best web service automatically thus ranking concepts in service textual documentation and classifies services on behalf of particular domains. Parallel computation is made easy with web services. The different management stages in the system of recommendation entail collection of dataset through WSDL on the semantic annotation basis, thereby recognizing the best service with the DOBT-Dynamic operation dependent discovering method, ranking through mechanisms MDBR - Multi-Dimensional based ranking, recommendation and classification. In this work, it has been employed a combination of fundamental ML estimators, namely Multinomial Naive Bayes (MNB) and Support Vector Machines (SVM), as well as ensemble techniques such as Bagging, Random Forests, and AdaBoost, to perform classification of Web services. It was observed from the investigate work that the adapted system of best web services recommendation defers high performance in contradiction of the existing recommendation technique regarding accuracy, efficiency in addition to processing time.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Hybrid CNN Method to Classify the Liver Diseases 肝脏疾病分类的高效混合CNN方法
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.004
Venugopal Reddy Modhugu
This study focuses on classifying liver diseases using dynamic CT scan images and deep learning techniques. The primary objective is to develop accurate and efficient models for distinguishing between different liver disease categories. Three deep learning models, ResNet50, ResNet18, and AlexNet, are employed for three-class classification, including Hepatitis/cirrhosis, Hepatitis/Fatty liver, and Hepatitis/Wilson's Disease. The dataset comprises dynamic CT scan images of the liver, each manually segmented to identify lesions. To enhance model performance, the data is pre-processed by resizing, normalization, and data augmentation. The dataset is split into training, validation, and test sets for model evaluation. The performance of each model is assessed using confusion matrices, accuracy, sensitivity, and specificity. Results show varying accuracies for different liver disease classes, indicating the strengths and limitations of the models. To overcome the limits of the three-class classifiers, a framework for the Efficient Hybrid CNN method to classify Liver diseases (EHCNNLD) is proposed, combining the predictions from the three models with weighted probabilities. The Proposed EHCNNLD method demonstrates improved accuracy and classification power, enhancing the overall performance for liver disease classification. The study highlights the potential of deep learning techniques in medical image analysis and clinical diagnosis. The findings provide valuable insights into developing robust and accurate models for liver disease classification, paving the way for medical research and patient care advancements.
本研究的重点是使用动态CT扫描图像和深度学习技术对肝脏疾病进行分类。主要目标是开发准确和有效的模型来区分不同的肝脏疾病类别。采用ResNet50、ResNet18和AlexNet三个深度学习模型进行三级分类,包括肝炎/肝硬化、肝炎/脂肪肝和肝炎/威尔逊病。该数据集包括肝脏的动态CT扫描图像,每个图像都手工分割以识别病变。为了增强模型性能,通过调整大小、规范化和数据增强对数据进行预处理。数据集分为训练集、验证集和测试集,用于模型评估。每个模型的性能评估使用混淆矩阵,准确性,灵敏度和特异性。结果显示不同肝脏疾病类别的准确性不同,表明模型的优势和局限性。为了克服三类分类器的局限性,提出了一种将三种模型的预测结果与加权概率相结合的高效混合CNN方法(EHCNNLD)框架。提出的EHCNNLD方法提高了准确率和分类能力,提高了肝脏疾病分类的整体性能。该研究强调了深度学习技术在医学图像分析和临床诊断中的潜力。这一发现为开发强大而准确的肝脏疾病分类模型提供了有价值的见解,为医学研究和患者护理的进步铺平了道路。
{"title":"Efficient Hybrid CNN Method to Classify the Liver Diseases","authors":"Venugopal Reddy Modhugu","doi":"10.58346/jowua.2023.i3.004","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.004","url":null,"abstract":"This study focuses on classifying liver diseases using dynamic CT scan images and deep learning techniques. The primary objective is to develop accurate and efficient models for distinguishing between different liver disease categories. Three deep learning models, ResNet50, ResNet18, and AlexNet, are employed for three-class classification, including Hepatitis/cirrhosis, Hepatitis/Fatty liver, and Hepatitis/Wilson's Disease. The dataset comprises dynamic CT scan images of the liver, each manually segmented to identify lesions. To enhance model performance, the data is pre-processed by resizing, normalization, and data augmentation. The dataset is split into training, validation, and test sets for model evaluation. The performance of each model is assessed using confusion matrices, accuracy, sensitivity, and specificity. Results show varying accuracies for different liver disease classes, indicating the strengths and limitations of the models. To overcome the limits of the three-class classifiers, a framework for the Efficient Hybrid CNN method to classify Liver diseases (EHCNNLD) is proposed, combining the predictions from the three models with weighted probabilities. The Proposed EHCNNLD method demonstrates improved accuracy and classification power, enhancing the overall performance for liver disease classification. The study highlights the potential of deep learning techniques in medical image analysis and clinical diagnosis. The findings provide valuable insights into developing robust and accurate models for liver disease classification, paving the way for medical research and patient care advancements.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Availability of Voice-Recognition Devices to Support Visually Impaired Students in Saudi Arabian Universities 语音识别设备的可用性,以支持视障学生在沙特阿拉伯大学
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.014
Dr. Yusra Jadallah Abed Khasawneh, Dr. Mohamad Ahmad Saleem Khasawneh
This study investigates the availability of instructing visually impaired students utilizing voice-recognition devices in universities in Saudi Arabia. The study also compares the learning encounters of understudies both recently and after the consolidation of such innovation into their instruction. The descriptive approach was utilized for the reason of depiction in this investigation. The study used observation and interviews to collect data, which was gathered from 50 participants. The study found that an unfinished program, a long learning process for the console and images, and a deficiency of qualified computer voice integration are all things that work against the device's guarantee and hold it back from coming to its full potential. Students’ degrees of excitement might change anyplace from typical to exceptional. The educational modules will be presented in stages, depending on each student's current skill level. It is accepted that students' ability to form viable utilize of computers within the learning process will proceed to make strides as a result of the expanding number of intercessions that are getting to be open.
本研究调查了沙特阿拉伯大学中使用语音识别设备指导视障学生的可用性。本研究还比较了这些创新融入学生教学后,学生的学习遭遇。描述性的方法是利用的原因,在这个调查的描述。该研究采用观察和访谈的方式收集数据,这些数据来自50名参与者。研究发现,一个未完成的程序,一个长时间的控制台和图像学习过程,以及缺乏合格的计算机语音集成,这些都不利于设备的保证,并阻碍它充分发挥其潜力。学生们的兴奋程度可能会从普通到特殊。教育模块将根据每个学生当前的技能水平分阶段呈现。人们普遍认为,学生在学习过程中有效利用计算机的能力将随着越来越多的代祷机会的开放而取得长足的进步。
{"title":"Availability of Voice-Recognition Devices to Support Visually Impaired Students in Saudi Arabian Universities","authors":"Dr. Yusra Jadallah Abed Khasawneh, Dr. Mohamad Ahmad Saleem Khasawneh","doi":"10.58346/jowua.2023.i3.014","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.014","url":null,"abstract":"This study investigates the availability of instructing visually impaired students utilizing voice-recognition devices in universities in Saudi Arabia. The study also compares the learning encounters of understudies both recently and after the consolidation of such innovation into their instruction. The descriptive approach was utilized for the reason of depiction in this investigation. The study used observation and interviews to collect data, which was gathered from 50 participants. The study found that an unfinished program, a long learning process for the console and images, and a deficiency of qualified computer voice integration are all things that work against the device's guarantee and hold it back from coming to its full potential. Students’ degrees of excitement might change anyplace from typical to exceptional. The educational modules will be presented in stages, depending on each student's current skill level. It is accepted that students' ability to form viable utilize of computers within the learning process will proceed to make strides as a result of the expanding number of intercessions that are getting to be open.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strengthening IoT Intrusion Detection through the HOPNET Model 利用HOPNET模型加强物联网入侵检测
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.007
Chandrababu Majjaru, Senthilkumar K.
The rapid growth of Internet of Things (IoT) applications has raised concerns about the security of IoT communication systems, particularly due to a surge in malicious attacks leading to network disruptions and system failures. This study introduces a novel solution, the Hyper-Parameter Optimized Progressive Neural Network (HOPNET) model, designed to effectively detect intrusions in IoT communication networks. Validation using the Nsl-Kdd dataset involves meticulous data preprocessing for error rectification and feature extraction across diverse attack categories. Implemented on the Java platform, the HOPNET model undergoes comprehensive evaluation through comparative analysis with established intrusion detection methods. Results demonstrate the superiority of the HOPNET model, with improved attack prediction scores and significantly reduced processing times, highlighting the importance of advanced intrusion detection methods for enhancing IoT communication security. The HOPNET model contributes by establishing robust defense against evolving cyber threats, ensuring a safer IoT ecosystem, and paving the way for proactive security measures as the IoT landscape continues to evolve.
物联网(IoT)应用的快速增长引起了人们对物联网通信系统安全性的担忧,特别是由于恶意攻击激增导致网络中断和系统故障。本研究引入了一种新颖的解决方案,超参数优化渐进式神经网络(HOPNET)模型,旨在有效检测物联网通信网络中的入侵。使用Nsl-Kdd数据集进行验证涉及细致的数据预处理,以便在不同的攻击类别中进行错误纠正和特征提取。HOPNET模型在Java平台上实现,通过与现有入侵检测方法的对比分析,对该模型进行了综合评价。结果证明了HOPNET模型的优越性,提高了攻击预测分数,显著减少了处理时间,突出了先进的入侵检测方法对增强物联网通信安全性的重要性。HOPNET模型通过建立针对不断发展的网络威胁的强大防御,确保更安全的物联网生态系统,并为物联网环境不断发展的主动安全措施铺平道路。
{"title":"Strengthening IoT Intrusion Detection through the HOPNET Model","authors":"Chandrababu Majjaru, Senthilkumar K.","doi":"10.58346/jowua.2023.i3.007","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.007","url":null,"abstract":"The rapid growth of Internet of Things (IoT) applications has raised concerns about the security of IoT communication systems, particularly due to a surge in malicious attacks leading to network disruptions and system failures. This study introduces a novel solution, the Hyper-Parameter Optimized Progressive Neural Network (HOPNET) model, designed to effectively detect intrusions in IoT communication networks. Validation using the Nsl-Kdd dataset involves meticulous data preprocessing for error rectification and feature extraction across diverse attack categories. Implemented on the Java platform, the HOPNET model undergoes comprehensive evaluation through comparative analysis with established intrusion detection methods. Results demonstrate the superiority of the HOPNET model, with improved attack prediction scores and significantly reduced processing times, highlighting the importance of advanced intrusion detection methods for enhancing IoT communication security. The HOPNET model contributes by establishing robust defense against evolving cyber threats, ensuring a safer IoT ecosystem, and paving the way for proactive security measures as the IoT landscape continues to evolve.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135038466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Activity Recognition Using Ensemble Neural Networks and The Analysis of Multi-Environment Sensor Data Within Smart Environments 基于集成神经网络的人类活动识别及智能环境下多环境传感器数据分析
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.016
Akila R., J. Brindha Merin, Radhika A., Dr. Niyati Kumari Behera
The significant focus and potential value of Human Activity Recognition (HAR) technologies based on non-invasive ambient sensors have been attributed to the advancement of Artificial Intelligence (AI) and the widespread adoption of sensors. Due to the proactive engagement of human activities and the utilization of Machine Learning (ML) techniques that depend on domain expertise, developing a standardized model for comprehending the everyday actions of diverse individuals has significant challenges. A technique for recognizing the user's everyday activities in multi-tenant intelligent environments has been developed. This methodology considers data feature limits and recognition approaches and is designed to limit sensor noise during human activities. This work aims at enhancing the quality of a publicly accessible HAR dataset to facilitate data-driven HAR.Additionally, the paper proposes a novel ensemble of neural networks (NN) as a data-driven HAR classifier. A Spatial Proximity Matrix (SPM)uses ambient sensors to facilitate contextawareness and mitigate data noise. The proposed method, named Homogeneous Ensemble Neural Network and Multi-environment Sensor Data (HENN-MSD), leverages a combination of a homogeneous ensemble NN and multi-environment sensor data to identify what individuals do in daily life accurately. The study featured the generation and integration of four fundamental models using the support-function fusion approach. This method included the computation of an output decision score for each basis classifier. The analysis of a comparative experiment conducted on the CASAS dataset indicates that the proposed HENN-MSD technique exhibits superior performance compared to the state-of-the-art methods in terms of accuracy (96.57%) in HAR.
基于非侵入性环境传感器的人类活动识别(HAR)技术的重要焦点和潜在价值归因于人工智能(AI)的进步和传感器的广泛采用。由于人类活动的主动参与和依赖于领域专业知识的机器学习(ML)技术的使用,开发一个标准化的模型来理解不同个体的日常行为具有重大挑战。开发了一种在多租户智能环境中识别用户日常活动的技术。该方法考虑了数据特征限制和识别方法,旨在限制人类活动期间的传感器噪声。这项工作旨在提高可公开访问的HAR数据集的质量,以促进数据驱动的HAR。此外,本文提出了一种新的神经网络集成(NN)作为数据驱动的HAR分类器。空间接近矩阵(SPM)使用环境传感器来促进上下文感知和减轻数据噪声。所提出的方法,称为均匀集成神经网络和多环境传感器数据(HENN-MSD),利用均匀集成神经网络和多环境传感器数据的组合来准确识别个人在日常生活中的行为。该研究的特点是使用支持函数融合方法生成和集成四个基本模型。该方法包括计算每个基分类器的输出决策分数。在CASAS数据集上进行的对比实验分析表明,所提出的HENN-MSD技术在HAR中的准确率(96.57%)优于现有方法。
{"title":"Human Activity Recognition Using Ensemble Neural Networks and The Analysis of Multi-Environment Sensor Data Within Smart Environments","authors":"Akila R., J. Brindha Merin, Radhika A., Dr. Niyati Kumari Behera","doi":"10.58346/jowua.2023.i3.016","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.016","url":null,"abstract":"The significant focus and potential value of Human Activity Recognition (HAR) technologies based on non-invasive ambient sensors have been attributed to the advancement of Artificial Intelligence (AI) and the widespread adoption of sensors. Due to the proactive engagement of human activities and the utilization of Machine Learning (ML) techniques that depend on domain expertise, developing a standardized model for comprehending the everyday actions of diverse individuals has significant challenges. A technique for recognizing the user's everyday activities in multi-tenant intelligent environments has been developed. This methodology considers data feature limits and recognition approaches and is designed to limit sensor noise during human activities. This work aims at enhancing the quality of a publicly accessible HAR dataset to facilitate data-driven HAR.Additionally, the paper proposes a novel ensemble of neural networks (NN) as a data-driven HAR classifier. A Spatial Proximity Matrix (SPM)uses ambient sensors to facilitate contextawareness and mitigate data noise. The proposed method, named Homogeneous Ensemble Neural Network and Multi-environment Sensor Data (HENN-MSD), leverages a combination of a homogeneous ensemble NN and multi-environment sensor data to identify what individuals do in daily life accurately. The study featured the generation and integration of four fundamental models using the support-function fusion approach. This method included the computation of an output decision score for each basis classifier. The analysis of a comparative experiment conducted on the CASAS dataset indicates that the proposed HENN-MSD technique exhibits superior performance compared to the state-of-the-art methods in terms of accuracy (96.57%) in HAR.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing User Experiences in Ubiquitous Soft Computing Environments with Fuzzy Agent Middleware 利用模糊代理中间件增强泛在软计算环境中的用户体验
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.003
V. Naren Thiruvalar, Yamini R., Manimekalai Dr.M.A.P., Dr. I Wayan Suryasa, Sugapriya S.
In the Ubiquitous Computing Environment (UCE) context, the successful provision of user-required services necessitates the collaboration of various system components, encompassing hardware parts, software components, and network connections. The utilization of UCE has presented some difficulties to customers seeking services in a diverse environment, including excessive Memory Usage (MU) and prolonged Component Construction Time (CCT). To optimize the user's experience, fuzzy agent employs a non-intrusive approach in online deep-rooted learning to get insights into user behavior. Integrating the advancements mentioned above aims to enhance the connectivity between users and information technology devices by utilizing an invisible network of UCE devices, creating dynamic computational environments that can effectively meet the users' needs. This work presents a unique methodology called Fuzzy Agent Middleware to Enhance User Experiences (FAM-EUI), which aims to improve user experiences in contexts where computer technology is seamlessly incorporated into everyday activities. This research endeavors to tackle the issues associated with imprecise data and enhance user-friendly interactions by integrating fuzzy logic with intelligent agents. The results highlight the potential of FAM in enhancing user interaction within ubiquitous soft computing, leading to improved efficiency and user-centered computing systems. This study provides valuable insights into integrating soft computing and agent-based technologies to enhance ubiquitous computing paradigms.
在泛在计算环境(UCE)上下文中,成功地提供用户所需的服务需要各种系统组件的协作,包括硬件部件、软件组件和网络连接。UCE的使用给客户在多样化的环境中寻求服务带来了一些困难,包括过度的内存使用(MU)和延长的组件构建时间(CCT)。为了优化用户体验,模糊代理在在线深度学习中采用非侵入式的方法来深入了解用户行为。集成上述技术进步的目的是利用UCE设备的不可见网络,增强用户与信息技术设备之间的连通性,创造能够有效满足用户需求的动态计算环境。这项工作提出了一种独特的方法,称为模糊代理中间件以增强用户体验(FAM-EUI),其目的是在计算机技术无缝融入日常活动的环境中改善用户体验。本研究致力于解决与不精确数据相关的问题,并通过将模糊逻辑与智能代理集成来增强用户友好的交互。结果强调FAM在增强无处不在的软计算中的用户交互方面的潜力,从而提高效率和以用户为中心的计算系统。本研究为整合软计算和基于代理的技术以增强泛在计算范式提供了有价值的见解。
{"title":"Enhancing User Experiences in Ubiquitous Soft Computing Environments with Fuzzy Agent Middleware","authors":"V. Naren Thiruvalar, Yamini R., Manimekalai Dr.M.A.P., Dr. I Wayan Suryasa, Sugapriya S.","doi":"10.58346/jowua.2023.i3.003","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.003","url":null,"abstract":"In the Ubiquitous Computing Environment (UCE) context, the successful provision of user-required services necessitates the collaboration of various system components, encompassing hardware parts, software components, and network connections. The utilization of UCE has presented some difficulties to customers seeking services in a diverse environment, including excessive Memory Usage (MU) and prolonged Component Construction Time (CCT). To optimize the user's experience, fuzzy agent employs a non-intrusive approach in online deep-rooted learning to get insights into user behavior. Integrating the advancements mentioned above aims to enhance the connectivity between users and information technology devices by utilizing an invisible network of UCE devices, creating dynamic computational environments that can effectively meet the users' needs. This work presents a unique methodology called Fuzzy Agent Middleware to Enhance User Experiences (FAM-EUI), which aims to improve user experiences in contexts where computer technology is seamlessly incorporated into everyday activities. This research endeavors to tackle the issues associated with imprecise data and enhance user-friendly interactions by integrating fuzzy logic with intelligent agents. The results highlight the potential of FAM in enhancing user interaction within ubiquitous soft computing, leading to improved efficiency and user-centered computing systems. This study provides valuable insights into integrating soft computing and agent-based technologies to enhance ubiquitous computing paradigms.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135039769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantitative Evaluation of Android Application Privacy Security Based on Privacy Policy and Behaviour 基于隐私策略和行为的Android应用隐私安全定量评价
Q1 Computer Science Pub Date : 2023-09-30 DOI: 10.58346/jowua.2023.i3.019
Alcides Bernardo Tello, Sohaib Alam, Archana Ravindra Salve, B.M. Kusuma Kumari, Meena Arora
The emerging landscape of Android applications in mobile phones encompasses industries involving millions and billions of app developers to improve usability and comfort for smartphone users. Popular apps are categorized into social media, entertainment, games, news, lifestyle, health and fitness. In this vein, privacy security is categorized into two major sections: distribution and development of particularities and running software on the user's mobile. According to European Union, the major issues of legal and regulations arising from the requirement from the GDPR, the Personal information protection law of China and other related regulations combined with the behaviour and privacy policy of application. In this article, Privacy security was quantitatively analyzed through data collection and analysis of scores by comparing the comprehensive use of ML, NLP and other technologies. E-privacy was regulated in the environment of mobile applications. The features were analyzed in privacy and data protection. The scope of this study is to evaluate the privacy security of the application in Android devices based on the privacy policy and behaviour.
Android应用程序在手机领域的兴起,涉及数以百万计的应用程序开发人员,以提高智能手机用户的可用性和舒适度。流行的应用程序分为社交媒体、娱乐、游戏、新闻、生活方式、健康和健身。在这种情况下,隐私安全被分为两个主要部分:特殊性的分发和开发,以及在用户的移动设备上运行软件。欧盟认为,主要的法律法规问题源于GDPR、中国个人信息保护法等相关法规的要求,并结合应用的行为和隐私政策。本文通过比较综合使用ML、NLP等技术,通过数据收集和分数分析,对隐私安全进行定量分析。电子隐私在移动应用环境下受到监管。分析了其在隐私和数据保护方面的特点。本研究的范围是基于隐私政策和行为来评估Android设备中应用程序的隐私安全性。
{"title":"Quantitative Evaluation of Android Application Privacy Security Based on Privacy Policy and Behaviour","authors":"Alcides Bernardo Tello, Sohaib Alam, Archana Ravindra Salve, B.M. Kusuma Kumari, Meena Arora","doi":"10.58346/jowua.2023.i3.019","DOIUrl":"https://doi.org/10.58346/jowua.2023.i3.019","url":null,"abstract":"The emerging landscape of Android applications in mobile phones encompasses industries involving millions and billions of app developers to improve usability and comfort for smartphone users. Popular apps are categorized into social media, entertainment, games, news, lifestyle, health and fitness. In this vein, privacy security is categorized into two major sections: distribution and development of particularities and running software on the user's mobile. According to European Union, the major issues of legal and regulations arising from the requirement from the GDPR, the Personal information protection law of China and other related regulations combined with the behaviour and privacy policy of application. In this article, Privacy security was quantitatively analyzed through data collection and analysis of scores by comparing the comprehensive use of ML, NLP and other technologies. E-privacy was regulated in the environment of mobile applications. The features were analyzed in privacy and data protection. The scope of this study is to evaluate the privacy security of the application in Android devices based on the privacy policy and behaviour.","PeriodicalId":38235,"journal":{"name":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135081317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1