首页 > 最新文献

Information (Switzerland)最新文献

英文 中文
Cost-Sensitive Models to Predict Risk of Cardiovascular Events in Patients with Chronic Heart Failure 预测慢性心力衰竭患者心血管事件风险的成本敏感模型
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-03 DOI: 10.3390/info14100542
Maria Carmela Groccia, Rosita Guido, Domenico Conforti, Corrado Pelaia, Giuseppe Armentaro, Alfredo Francesco Toscani, Sofia Miceli, Elena Succurro, Marta Letizia Hribal, Angela Sciacqua
Chronic heart failure (CHF) is a clinical syndrome characterised by symptoms and signs due to structural and/or functional abnormalities of the heart. CHF confers risk for cardiovascular deterioration events which cause recurrent hospitalisations and high mortality rates. The early prediction of these events is very important to limit serious consequences, improve the quality of care, and reduce its burden. CHF is a progressive condition in which patients may remain asymptomatic before the onset of symptoms, as observed in heart failure with a preserved ejection fraction. The early detection of underlying causes is critical for treatment optimisation and prognosis improvement. To develop models to predict cardiovascular deterioration events in patients with chronic heart failure, a real dataset was constructed and a knowledge discovery task was implemented in this study. The dataset is imbalanced, as it is common in real-world applications. It thus posed a challenge because imbalanced datasets tend to be overwhelmed by the abundance of majority-class instances during the learning process. To address the issue, a pipeline was developed specifically to handle imbalanced data. Different predictive models were developed and compared. To enhance sensitivity and other performance metrics, we employed multiple approaches, including data resampling, cost-sensitive methods, and a hybrid method that combines both techniques. These methods were utilised to assess the predictive capabilities of the models and their effectiveness in handling imbalanced data. By using these metrics, we aimed to identify the most effective strategies for achieving improved model performance in real scenarios with imbalanced datasets. The best model for predicting cardiovascular events achieved mean a sensitivity 65%, a mean specificity 55%, and a mean area under the curve of 0.71. The results show that cost-sensitive models combined with over/under sampling approaches are effective for the meaningful prediction of cardiovascular events in CHF patients.
慢性心力衰竭(CHF)是一种以心脏结构和/或功能异常引起的症状和体征为特征的临床综合征。CHF具有心血管恶化事件的风险,导致反复住院和高死亡率。这些事件的早期预测对于限制严重后果、提高护理质量和减轻负担非常重要。CHF是一种进行性疾病,患者在出现症状前可能仍无症状,如在射血分数保持不变的心力衰竭中观察到的那样。早期发现潜在病因对优化治疗和改善预后至关重要。为了建立预测慢性心力衰竭患者心血管恶化事件的模型,本研究构建了一个真实数据集,并实施了一个知识发现任务。数据集是不平衡的,这在实际应用程序中很常见。因此,它提出了一个挑战,因为在学习过程中,不平衡的数据集往往被大量的多数类实例所淹没。为了解决这个问题,专门开发了一个管道来处理不平衡数据。建立了不同的预测模型并进行了比较。为了提高灵敏度和其他性能指标,我们采用了多种方法,包括数据重采样、成本敏感方法,以及结合这两种技术的混合方法。这些方法被用来评估模型的预测能力及其在处理不平衡数据方面的有效性。通过使用这些指标,我们旨在确定在不平衡数据集的真实场景中实现改进模型性能的最有效策略。预测心血管事件的最佳模型平均灵敏度为65%,平均特异性为55%,平均曲线下面积为0.71。结果表明,成本敏感模型结合过采样/欠采样方法对CHF患者心血管事件的有意义预测是有效的。
{"title":"Cost-Sensitive Models to Predict Risk of Cardiovascular Events in Patients with Chronic Heart Failure","authors":"Maria Carmela Groccia, Rosita Guido, Domenico Conforti, Corrado Pelaia, Giuseppe Armentaro, Alfredo Francesco Toscani, Sofia Miceli, Elena Succurro, Marta Letizia Hribal, Angela Sciacqua","doi":"10.3390/info14100542","DOIUrl":"https://doi.org/10.3390/info14100542","url":null,"abstract":"Chronic heart failure (CHF) is a clinical syndrome characterised by symptoms and signs due to structural and/or functional abnormalities of the heart. CHF confers risk for cardiovascular deterioration events which cause recurrent hospitalisations and high mortality rates. The early prediction of these events is very important to limit serious consequences, improve the quality of care, and reduce its burden. CHF is a progressive condition in which patients may remain asymptomatic before the onset of symptoms, as observed in heart failure with a preserved ejection fraction. The early detection of underlying causes is critical for treatment optimisation and prognosis improvement. To develop models to predict cardiovascular deterioration events in patients with chronic heart failure, a real dataset was constructed and a knowledge discovery task was implemented in this study. The dataset is imbalanced, as it is common in real-world applications. It thus posed a challenge because imbalanced datasets tend to be overwhelmed by the abundance of majority-class instances during the learning process. To address the issue, a pipeline was developed specifically to handle imbalanced data. Different predictive models were developed and compared. To enhance sensitivity and other performance metrics, we employed multiple approaches, including data resampling, cost-sensitive methods, and a hybrid method that combines both techniques. These methods were utilised to assess the predictive capabilities of the models and their effectiveness in handling imbalanced data. By using these metrics, we aimed to identify the most effective strategies for achieving improved model performance in real scenarios with imbalanced datasets. The best model for predicting cardiovascular events achieved mean a sensitivity 65%, a mean specificity 55%, and a mean area under the curve of 0.71. The results show that cost-sensitive models combined with over/under sampling approaches are effective for the meaningful prediction of cardiovascular events in CHF patients.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135743780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signal Processing Application Based on a Hybrid Wavelet Transform to Fault Detection and Identification in Power System 基于混合小波变换的信号处理在电力系统故障检测与识别中的应用
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-03 DOI: 10.3390/info14100540
Yasmin Nasser Mohamed, Serhat Seker, Tahir Cetin Akinci
The power system is one of the most susceptible systems to failures, which are most frequently caused by transmission line faults. Transmission line failures account for 85% of all power system malfunctions. However, over the last decade, numerous fault detection methods have been developed to ensure the reliability and stability of power systems. A hybrid detection method based on the idea of redundancy property is presented in this paper. Because the continuous wavelet transform itself does not extract fault features for small defects effectively, the stationary wavelet transform approach is employed to assist in their detection. As a result of its ability to decompose the signal into high- and low-frequency components, undecimated reconstruction by using the algebraic summation operation (ASO) is used. This approach creates redundancy, which is useful for the feature extraction of small defects and makes faulty parts more evident. The numerical value of the redundancy ratio’s contribution to the original signal is approximately equal to 36%. Following this method for redundant signal reconstruction, a continuous wavelet transform is used to extract the fault characteristic significantly easier in the time-scale (frequency) domain. Finally, the suggested technique has been demonstrated to be an efficient fault detection and identification tool for use in power systems. In fact, using this advanced signal processing technique will help with early fault detection, which is mainly about predictive maintenance. This application provides more reliable operation conditions.
电力系统是最容易发生故障的系统之一,其中最常见的故障是由输电线路故障引起的。输电线路故障占所有电力系统故障的85%。然而,在过去的十年中,为了保证电力系统的可靠性和稳定性,已经开发了许多故障检测方法。提出了一种基于冗余性思想的混合检测方法。由于连续小波变换本身不能有效提取小缺陷的故障特征,因此采用平稳小波变换方法辅助小缺陷的检测。由于它能够将信号分解为高频和低频分量,因此使用代数求和运算(ASO)进行非消差重建。这种方法产生了冗余,有利于小缺陷的特征提取,使故障部件更加明显。冗余比对原始信号的贡献数值约为36%。在此冗余信号重构方法的基础上,采用连续小波变换在时间(频率)域更容易提取故障特征。最后,该方法已被证明是一种有效的故障检测和识别工具,可用于电力系统。事实上,使用这种先进的信号处理技术将有助于早期故障检测,这主要是关于预测性维护。该应用提供了更可靠的运行条件。
{"title":"Signal Processing Application Based on a Hybrid Wavelet Transform to Fault Detection and Identification in Power System","authors":"Yasmin Nasser Mohamed, Serhat Seker, Tahir Cetin Akinci","doi":"10.3390/info14100540","DOIUrl":"https://doi.org/10.3390/info14100540","url":null,"abstract":"The power system is one of the most susceptible systems to failures, which are most frequently caused by transmission line faults. Transmission line failures account for 85% of all power system malfunctions. However, over the last decade, numerous fault detection methods have been developed to ensure the reliability and stability of power systems. A hybrid detection method based on the idea of redundancy property is presented in this paper. Because the continuous wavelet transform itself does not extract fault features for small defects effectively, the stationary wavelet transform approach is employed to assist in their detection. As a result of its ability to decompose the signal into high- and low-frequency components, undecimated reconstruction by using the algebraic summation operation (ASO) is used. This approach creates redundancy, which is useful for the feature extraction of small defects and makes faulty parts more evident. The numerical value of the redundancy ratio’s contribution to the original signal is approximately equal to 36%. Following this method for redundant signal reconstruction, a continuous wavelet transform is used to extract the fault characteristic significantly easier in the time-scale (frequency) domain. Finally, the suggested technique has been demonstrated to be an efficient fault detection and identification tool for use in power systems. In fact, using this advanced signal processing technique will help with early fault detection, which is mainly about predictive maintenance. This application provides more reliable operation conditions.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135739421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Healthcare Trust Evolution with Explainable Artificial Intelligence: Bibliometric Analysis 可解释人工智能的医疗信任演变:文献计量分析
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-03 DOI: 10.3390/info14100541
Pummy Dhiman, Anupam Bonkra, Amandeep Kaur, Yonis Gulzar, Yasir Hamid, Mohammad Shuaib Mir, Arjumand Bano Soomro, Osman Elwasila
Recent developments in IoT, big data, fog and edge networks, and AI technologies have had a profound impact on a number of industries, including medical. The use of AI for therapeutic purposes has been hampered by its inexplicability. Explainable Artificial Intelligence (XAI), a revolutionary movement, has arisen to solve this constraint. By using decision-making and prediction outputs, XAI seeks to improve the explicability of standard AI models. In this study, we examined global developments in empirical XAI research in the medical field. The bibliometric analysis tools VOSviewer and Biblioshiny were used to examine 171 open access publications from the Scopus database (2019–2022). Our findings point to several prospects for growth in this area, notably in areas of medicine like diagnostic imaging. With 109 research articles using XAI for healthcare classification, prediction, and diagnosis, the USA leads the world in research output. With 88 citations, IEEE Access has the greatest number of publications of all the journals. Our extensive survey covers a range of XAI applications in healthcare, such as diagnosis, therapy, prevention, and palliation, and offers helpful insights for researchers who are interested in this field. This report provides a direction for future healthcare industry research endeavors.
物联网、大数据、雾和边缘网络以及人工智能技术的最新发展对包括医疗在内的许多行业产生了深远的影响。人工智能在治疗方面的应用因其难以解释而受到阻碍。可解释人工智能(XAI)是一场革命性的运动,旨在解决这一限制。通过使用决策和预测输出,XAI寻求提高标准AI模型的可解释性。在本研究中,我们考察了医学领域实证XAI研究的全球发展。使用文献计量分析工具VOSviewer和Biblioshiny对Scopus数据库(2019-2022)中的171篇开放获取出版物进行了分析。我们的研究结果指出了该领域的几个增长前景,特别是在诊断成像等医学领域。有109篇研究文章使用XAI进行医疗保健分类、预测和诊断,美国在研究产出方面领先世界。IEEE Access被引用88次,是所有期刊中发表次数最多的。我们的广泛调查涵盖了医疗保健中的一系列XAI应用,如诊断、治疗、预防和缓解,并为对该领域感兴趣的研究人员提供了有用的见解。本报告为未来医疗保健行业的研究工作提供了一个方向。
{"title":"Healthcare Trust Evolution with Explainable Artificial Intelligence: Bibliometric Analysis","authors":"Pummy Dhiman, Anupam Bonkra, Amandeep Kaur, Yonis Gulzar, Yasir Hamid, Mohammad Shuaib Mir, Arjumand Bano Soomro, Osman Elwasila","doi":"10.3390/info14100541","DOIUrl":"https://doi.org/10.3390/info14100541","url":null,"abstract":"Recent developments in IoT, big data, fog and edge networks, and AI technologies have had a profound impact on a number of industries, including medical. The use of AI for therapeutic purposes has been hampered by its inexplicability. Explainable Artificial Intelligence (XAI), a revolutionary movement, has arisen to solve this constraint. By using decision-making and prediction outputs, XAI seeks to improve the explicability of standard AI models. In this study, we examined global developments in empirical XAI research in the medical field. The bibliometric analysis tools VOSviewer and Biblioshiny were used to examine 171 open access publications from the Scopus database (2019–2022). Our findings point to several prospects for growth in this area, notably in areas of medicine like diagnostic imaging. With 109 research articles using XAI for healthcare classification, prediction, and diagnosis, the USA leads the world in research output. With 88 citations, IEEE Access has the greatest number of publications of all the journals. Our extensive survey covers a range of XAI applications in healthcare, such as diagnosis, therapy, prevention, and palliation, and offers helpful insights for researchers who are interested in this field. This report provides a direction for future healthcare industry research endeavors.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ECG-Based Driving Fatigue Detection using Heart Rate Variability Analysis with Mutual Information 基于互信息心率变异性分析的心电疲劳检测
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-02 DOI: 10.3390/info14100539
Junartho Halomoan, Kalamullah Ramli, Dodi Sudiana, Teddy Surya Gunawan, Muhammad Salman
One of the WHO’s strategies to reduce road traffic injuries and fatalities is to enhance vehicle safety. Driving fatigue detection can be used to increase vehicle safety. Our previous study developed an ECG-based driving fatigue detection framework with AdaBoost, producing a high cross-validated accuracy of 98.82% and a testing accuracy of 81.82%; however, the study did not consider the driver’s cognitive state related to fatigue and redundant features in the classification model. In this paper, we propose developments in the feature extraction and feature selection phases in the driving fatigue detection framework. For feature extraction, we employ heart rate fragmentation to extract non-linear features to analyze the driver’s cognitive status. These features are combined with features obtained from heart rate variability analysis in the time, frequency, and non-linear domains. In feature selection, we employ mutual information to filter redundant features. To find the number of selected features with the best model performance, we carried out 28 combination experiments consisting of 7 possible selected features out of 58 features and 4 ensemble learnings. The results of the experiments show that the random forest algorithm with 44 selected features produced the best model performance testing accuracy of 95.45%, with cross-validated accuracy of 98.65%.
世卫组织减少道路交通伤害和死亡的战略之一是加强车辆安全。驾驶疲劳检测可以提高车辆的安全性。我们之前的研究利用AdaBoost开发了一个基于心电图的驾驶疲劳检测框架,交叉验证准确率高达98.82%,测试准确率高达81.82%;然而,本研究在分类模型中并未考虑驾驶员与疲劳和冗余特征相关的认知状态。在本文中,我们提出了特征提取和特征选择阶段在驾驶疲劳检测框架的发展。在特征提取方面,采用心率碎片化提取非线性特征,分析驾驶员的认知状态。这些特征与心率变异性分析在时间、频率和非线性域获得的特征相结合。在特征选择上,采用互信息过滤冗余特征。为了找到具有最佳模型性能的选择特征的数量,我们进行了28个组合实验,包括从58个特征中选择7个可能的特征和4个集成学习。实验结果表明,选取44个特征的随机森林算法模型性能测试准确率为95.45%,交叉验证准确率为98.65%。
{"title":"ECG-Based Driving Fatigue Detection using Heart Rate Variability Analysis with Mutual Information","authors":"Junartho Halomoan, Kalamullah Ramli, Dodi Sudiana, Teddy Surya Gunawan, Muhammad Salman","doi":"10.3390/info14100539","DOIUrl":"https://doi.org/10.3390/info14100539","url":null,"abstract":"One of the WHO’s strategies to reduce road traffic injuries and fatalities is to enhance vehicle safety. Driving fatigue detection can be used to increase vehicle safety. Our previous study developed an ECG-based driving fatigue detection framework with AdaBoost, producing a high cross-validated accuracy of 98.82% and a testing accuracy of 81.82%; however, the study did not consider the driver’s cognitive state related to fatigue and redundant features in the classification model. In this paper, we propose developments in the feature extraction and feature selection phases in the driving fatigue detection framework. For feature extraction, we employ heart rate fragmentation to extract non-linear features to analyze the driver’s cognitive status. These features are combined with features obtained from heart rate variability analysis in the time, frequency, and non-linear domains. In feature selection, we employ mutual information to filter redundant features. To find the number of selected features with the best model performance, we carried out 28 combination experiments consisting of 7 possible selected features out of 58 features and 4 ensemble learnings. The results of the experiments show that the random forest algorithm with 44 selected features produced the best model performance testing accuracy of 95.45%, with cross-validated accuracy of 98.65%.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135895136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Authentication Mechanisms Based on Immersive Technologies: A Systematic Review 基于沉浸式技术的用户认证机制:系统综述
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-02 DOI: 10.3390/info14100538
Ioanna Anastasaki, George Drosatos, George Pavlidis, Konstantinos Rantos
Immersive technologies are revolutionary technological advancements that offer users unparalleled experiences of immersion in a virtual or mixed world of virtual and real elements. In such technology, user privacy, security, and anonymity are paramount, as users often share private and sensitive information. Therefore, user authentication is a critical requirement in these environments. This paper presents a systematic literature review of recently published research papers on immersive technology-based user authentication mechanisms. After conducting the literature search in September 2023 using Scopus, the selection process identified 36 research publications that were further analyzed. The analysis revealed three major types of authentications related to immersive technologies, consistent with previous works: knowledge-based, biometric, and multi-factor methods. The reviewed papers are categorized according to these groups, and the methods used are scrutinized. To the best of our knowledge, this systematic literature review is the first that provides a comprehensive consolidation of immersive technologies for user authentication in virtual, augmented, and mixed reality.
沉浸式技术是革命性的技术进步,为用户提供沉浸在虚拟或虚拟和真实元素混合世界中的无与伦比的体验。在这种技术中,用户隐私、安全性和匿名性至关重要,因为用户经常共享私人和敏感信息。因此,在这些环境中,用户身份验证是一个关键需求。本文对最近发表的基于沉浸式技术的用户认证机制的研究论文进行了系统的文献综述。在2023年9月使用Scopus进行文献检索后,选择过程确定了36篇研究出版物进行进一步分析。分析揭示了与沉浸式技术相关的三种主要认证类型,与之前的工作一致:基于知识的、生物识别的和多因素的方法。被评审的论文根据这些组进行分类,使用的方法被仔细审查。据我们所知,这篇系统的文献综述是第一次全面整合沉浸式技术,用于虚拟、增强和混合现实中的用户身份验证。
{"title":"User Authentication Mechanisms Based on Immersive Technologies: A Systematic Review","authors":"Ioanna Anastasaki, George Drosatos, George Pavlidis, Konstantinos Rantos","doi":"10.3390/info14100538","DOIUrl":"https://doi.org/10.3390/info14100538","url":null,"abstract":"Immersive technologies are revolutionary technological advancements that offer users unparalleled experiences of immersion in a virtual or mixed world of virtual and real elements. In such technology, user privacy, security, and anonymity are paramount, as users often share private and sensitive information. Therefore, user authentication is a critical requirement in these environments. This paper presents a systematic literature review of recently published research papers on immersive technology-based user authentication mechanisms. After conducting the literature search in September 2023 using Scopus, the selection process identified 36 research publications that were further analyzed. The analysis revealed three major types of authentications related to immersive technologies, consistent with previous works: knowledge-based, biometric, and multi-factor methods. The reviewed papers are categorized according to these groups, and the methods used are scrutinized. To the best of our knowledge, this systematic literature review is the first that provides a comprehensive consolidation of immersive technologies for user authentication in virtual, augmented, and mixed reality.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135831361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Homomorphic Encryption Framework for Privacy-Preserving Spiking Neural Networks 一种保护隐私的脉冲神经网络的同态加密框架
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-01 DOI: 10.3390/info14100537
Farzad Nikfam, Raffaele Casaburi, Alberto Marchisio, Maurizio Martina, Muhammad Shafique
Machine learning (ML) is widely used today, especially through deep neural networks (DNNs); however, increasing computational load and resource requirements have led to cloud-based solutions. To address this problem, a new generation of networks has emerged called spiking neural networks (SNNs), which mimic the behavior of the human brain to improve efficiency and reduce energy consumption. These networks often process large amounts of sensitive information, such as confidential data, and thus privacy issues arise. Homomorphic encryption (HE) offers a solution, allowing calculations to be performed on encrypted data without decrypting them. This research compares traditional DNNs and SNNs using the Brakerski/Fan-Vercauteren (BFV) encryption scheme. The LeNet-5 and AlexNet models, widely-used convolutional architectures, are used for both DNN and SNN models based on their respective architectures, and the networks are trained and compared using the FashionMNIST dataset. The results show that SNNs using HE achieve up to 40% higher accuracy than DNNs for low values of the plaintext modulus t, although their execution time is longer due to their time-coding nature with multiple time steps.
机器学习(ML)今天被广泛使用,特别是通过深度神经网络(dnn);然而,不断增加的计算负载和资源需求导致了基于云的解决方案。为了解决这个问题,新一代的神经网络出现了,称为峰值神经网络(snn),它模仿人类大脑的行为来提高效率和减少能量消耗。这些网络通常处理大量敏感信息,例如机密数据,因此出现隐私问题。同态加密(HE)提供了一种解决方案,允许在不解密加密数据的情况下对其执行计算。本研究比较了使用Brakerski/Fan-Vercauteren (BFV)加密方案的传统dnn和snn。广泛使用的卷积架构LeNet-5和AlexNet模型基于各自的架构用于DNN和SNN模型,并使用FashionMNIST数据集对网络进行训练和比较。结果表明,在较低的明文模数t值下,使用HE的snn的准确率比dnn高40%,尽管它们的执行时间更长,因为它们具有多个时间步长的时间编码性质。
{"title":"A Homomorphic Encryption Framework for Privacy-Preserving Spiking Neural Networks","authors":"Farzad Nikfam, Raffaele Casaburi, Alberto Marchisio, Maurizio Martina, Muhammad Shafique","doi":"10.3390/info14100537","DOIUrl":"https://doi.org/10.3390/info14100537","url":null,"abstract":"Machine learning (ML) is widely used today, especially through deep neural networks (DNNs); however, increasing computational load and resource requirements have led to cloud-based solutions. To address this problem, a new generation of networks has emerged called spiking neural networks (SNNs), which mimic the behavior of the human brain to improve efficiency and reduce energy consumption. These networks often process large amounts of sensitive information, such as confidential data, and thus privacy issues arise. Homomorphic encryption (HE) offers a solution, allowing calculations to be performed on encrypted data without decrypting them. This research compares traditional DNNs and SNNs using the Brakerski/Fan-Vercauteren (BFV) encryption scheme. The LeNet-5 and AlexNet models, widely-used convolutional architectures, are used for both DNN and SNN models based on their respective architectures, and the networks are trained and compared using the FashionMNIST dataset. The results show that SNNs using HE achieve up to 40% higher accuracy than DNNs for low values of the plaintext modulus t, although their execution time is longer due to their time-coding nature with multiple time steps.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135458740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing 基于群体的网络安全渗透测试:智能家居和物联网网络的安全意识
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-30 DOI: 10.3390/info14100536
Thomas Schiller, Bruce Caulkins, Annie S. Wu, Sean Mondesire
Internet of Things (IoT) devices are common in today’s computer networks. These devices can be computationally powerful, yet prone to cybersecurity exploitation. To remedy these growing security weaknesses, this work proposes a new artificial intelligence method that makes these IoT networks safer through the use of autonomous, swarm-based cybersecurity penetration testing. In this work, the introduced Particle Swarm Optimization (PSO) penetration testing technique is compared against traditional linear and queue-based approaches to find vulnerabilities in smart homes and IoT networks. To evaluate the effectiveness of the PSO approach, a network simulator is used to simulate smart home networks of two scales: a small, home network and a large, commercial-sized network. These experiments demonstrate that the swarm-based algorithms detect vulnerabilities significantly faster than the linear algorithms. The presented findings support the case that autonomous and swarm-based penetration testing in a network could be used to render more secure IoT networks in the future. This approach can affect private households with smart home networks, settings within the Industrial Internet of Things (IIoT), and military environments.
物联网(IoT)设备在当今的计算机网络中很常见。这些设备可能具有强大的计算能力,但容易被网络安全利用。为了弥补这些日益增长的安全弱点,这项工作提出了一种新的人工智能方法,通过使用自主的、基于群体的网络安全渗透测试,使这些物联网网络更加安全。在这项工作中,将引入的粒子群优化(PSO)渗透测试技术与传统的线性和基于队列的方法进行比较,以发现智能家居和物联网网络中的漏洞。为了评估PSO方法的有效性,使用网络模拟器来模拟两种规模的智能家庭网络:小型家庭网络和大型商业规模网络。实验结果表明,基于群算法的漏洞检测速度明显快于线性算法。所提出的研究结果支持这样一种情况,即网络中的自主和基于群体的渗透测试可用于在未来呈现更安全的物联网网络。这种方法可能会影响拥有智能家庭网络的私人家庭、工业物联网(IIoT)内的设置和军事环境。
{"title":"Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing","authors":"Thomas Schiller, Bruce Caulkins, Annie S. Wu, Sean Mondesire","doi":"10.3390/info14100536","DOIUrl":"https://doi.org/10.3390/info14100536","url":null,"abstract":"Internet of Things (IoT) devices are common in today’s computer networks. These devices can be computationally powerful, yet prone to cybersecurity exploitation. To remedy these growing security weaknesses, this work proposes a new artificial intelligence method that makes these IoT networks safer through the use of autonomous, swarm-based cybersecurity penetration testing. In this work, the introduced Particle Swarm Optimization (PSO) penetration testing technique is compared against traditional linear and queue-based approaches to find vulnerabilities in smart homes and IoT networks. To evaluate the effectiveness of the PSO approach, a network simulator is used to simulate smart home networks of two scales: a small, home network and a large, commercial-sized network. These experiments demonstrate that the swarm-based algorithms detect vulnerabilities significantly faster than the linear algorithms. The presented findings support the case that autonomous and swarm-based penetration testing in a network could be used to render more secure IoT networks in the future. This approach can affect private households with smart home networks, settings within the Industrial Internet of Things (IIoT), and military environments.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136344030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RTAD: A Real-Time Animal Object Detection Model Based on a Large Selective Kernel and Channel Pruning RTAD:基于大选择核和通道修剪的实时动物目标检测模型
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-30 DOI: 10.3390/info14100535
Sicong Liu, Qingcheng Fan, Chunjiang Zhao, Shuqin Li
Animal resources are significant to human survival and development and the ecosystem balance. Automated multi-animal object detection is critical in animal research and conservation and ecosystem monitoring. The objective is to design a model that mitigates the challenges posed by the large number of parameters and computations in existing animal object detection methods. We developed a backbone network with enhanced representative capabilities to pursue this goal. This network combines the foundational structure of the Transformer model with the Large Selective Kernel (LSK) module, known for its wide receptive field. To further reduce the number of parameters and computations, we incorporated a channel pruning technique based on Fisher information to eliminate channels of lower importance. With the help of the advantages of the above designs, a real-time animal object detection model based on a Large Selective Kernel and channel pruning (RTAD) was built. The model was evaluated using a public animal dataset, AP-10K, which included 50 annotated categories. The results demonstrated that our model has almost half the parameters of YOLOv8-s yet surpasses it by 6.2 AP. Our model provides a new solution for real-time animal object detection.
动物资源对人类生存发展和生态系统平衡具有重要意义。自动化多动物目标检测在动物研究、保护和生态系统监测中至关重要。目的是设计一个模型,以减轻现有动物目标检测方法中大量参数和计算所带来的挑战。为了实现这一目标,我们开发了一个具有增强代表功能的骨干网络。该网络结合了Transformer模型的基本结构和大选择内核(Large Selective Kernel, LSK)模块,后者以其广泛的接受域而闻名。为了进一步减少参数数量和计算量,我们采用了基于Fisher信息的信道修剪技术来消除较低重要性的信道。利用以上设计的优点,建立了基于大选择核和通道修剪(RTAD)的实时动物目标检测模型。该模型使用公共动物数据集AP-10K进行评估,该数据集包括50个带注释的类别。结果表明,该模型的参数几乎只有YOLOv8-s的一半,但却超过了YOLOv8-s的6.2 AP,为实时动物目标检测提供了新的解决方案。
{"title":"RTAD: A Real-Time Animal Object Detection Model Based on a Large Selective Kernel and Channel Pruning","authors":"Sicong Liu, Qingcheng Fan, Chunjiang Zhao, Shuqin Li","doi":"10.3390/info14100535","DOIUrl":"https://doi.org/10.3390/info14100535","url":null,"abstract":"Animal resources are significant to human survival and development and the ecosystem balance. Automated multi-animal object detection is critical in animal research and conservation and ecosystem monitoring. The objective is to design a model that mitigates the challenges posed by the large number of parameters and computations in existing animal object detection methods. We developed a backbone network with enhanced representative capabilities to pursue this goal. This network combines the foundational structure of the Transformer model with the Large Selective Kernel (LSK) module, known for its wide receptive field. To further reduce the number of parameters and computations, we incorporated a channel pruning technique based on Fisher information to eliminate channels of lower importance. With the help of the advantages of the above designs, a real-time animal object detection model based on a Large Selective Kernel and channel pruning (RTAD) was built. The model was evaluated using a public animal dataset, AP-10K, which included 50 annotated categories. The results demonstrated that our model has almost half the parameters of YOLOv8-s yet surpasses it by 6.2 AP. Our model provides a new solution for real-time animal object detection.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136344697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sound Event Detection in Domestic Environment Using Frequency-Dynamic Convolution and Local Attention 基于频率动态卷积和局部注意的环境声事件检测
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-30 DOI: 10.3390/info14100534
Grigorios-Aris Cheimariotis, Nikolaos Mitianoudis
This work describes a methodology for sound event detection in domestic environments. Efficient solutions in this task can support the autonomous living of the elderly. The methodology deals with the “Challenge on Detection and Classification of Acoustic Scenes and Events (DCASE)” 2023, and more specifically with Task 4a “Sound event detection of domestic activities”. This task involves the detection of 10 common events in domestic environments in 10 s sound clips. The events may have arbitrary duration in the 10 s clip. The main components of the methodology are data augmentation on mel-spectrograms that represent the sound clips, feature extraction by passing spectrograms through a frequency-dynamic convolution network with an extra attention module in sequence with each convolution, concatenation of these features with BEATs embeddings, and use of BiGRU for sequence modeling. Also, a mean teacher model is employed for leveraging unlabeled data. This research focuses on the effect of data augmentation techniques, of the feature extraction models, and on self-supervised learning. The main contribution is the proposed feature extraction model, which uses weighted attention on frequency in each convolution, combined in sequence with a local attention module adopted by computer vision. The proposed system features promising and robust performance.
这项工作描述了一种在家庭环境中检测声音事件的方法。这项任务的有效解决方案可以支持老年人的自主生活。该方法处理2023年的“声学场景和事件的检测和分类挑战(DCASE)”,更具体地说,是任务4a“家庭活动的声音事件检测”。这项任务包括在10秒的声音片段中检测10个家庭环境中常见的事件。事件可以在10秒剪辑中具有任意的持续时间。该方法的主要组成部分是对代表声音片段的mel-谱图进行数据增强,通过频率动态卷积网络传递谱图(每个卷积都有一个额外的注意模块)来提取特征,将这些特征与BEATs嵌入连接起来,并使用BiGRU进行序列建模。此外,平均教师模型被用于利用未标记的数据。本研究的重点是数据增强技术、特征提取模型和自监督学习的效果。本文的主要贡献是提出的特征提取模型,该模型在每个卷积中对频率进行加权关注,并依次与计算机视觉采用的局部关注模块相结合。该系统具有良好的鲁棒性。
{"title":"Sound Event Detection in Domestic Environment Using Frequency-Dynamic Convolution and Local Attention","authors":"Grigorios-Aris Cheimariotis, Nikolaos Mitianoudis","doi":"10.3390/info14100534","DOIUrl":"https://doi.org/10.3390/info14100534","url":null,"abstract":"This work describes a methodology for sound event detection in domestic environments. Efficient solutions in this task can support the autonomous living of the elderly. The methodology deals with the “Challenge on Detection and Classification of Acoustic Scenes and Events (DCASE)” 2023, and more specifically with Task 4a “Sound event detection of domestic activities”. This task involves the detection of 10 common events in domestic environments in 10 s sound clips. The events may have arbitrary duration in the 10 s clip. The main components of the methodology are data augmentation on mel-spectrograms that represent the sound clips, feature extraction by passing spectrograms through a frequency-dynamic convolution network with an extra attention module in sequence with each convolution, concatenation of these features with BEATs embeddings, and use of BiGRU for sequence modeling. Also, a mean teacher model is employed for leveraging unlabeled data. This research focuses on the effect of data augmentation techniques, of the feature extraction models, and on self-supervised learning. The main contribution is the proposed feature extraction model, which uses weighted attention on frequency in each convolution, combined in sequence with a local attention module adopted by computer vision. The proposed system features promising and robust performance.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136344282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Smart Contract Vulnerability Analysis Tools: A Domain-Specific Perspective 智能合约漏洞分析工具的评估:特定领域视角
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-29 DOI: 10.3390/info14100533
Bahareh Lashkari, Petr Musilek
With the widespread adoption of blockchain platforms across various decentralized applications, the smart contract’s vulnerabilities are continuously growing and evolving. Consequently, a failure to optimize conventional vulnerability analysis methods results in unforeseen effects caused by overlooked classes of vulnerabilities. Current methods have difficulty dealing with multifaceted intrusions, which calls for more robust approaches. Therefore, overdependence on environment-defined parameters in the contract execution logic binds the contract to the manipulation of such parameters and is perceived as a security vulnerability. Several vulnerability analysis tools have been identified as insufficient to effectively identify certain types of vulnerability. In this paper, we perform a domain-specific evaluation of state-of-the-art vulnerability detection tools on smart contracts. A domain can be defined as a particular area of knowledge, expertise, or industry. We use a perspective specific to the area of energy contracts to draw logical and language-dependent features to advance the structural and procedural comprehension of these contracts. The goal is to reach a greater degree of abstraction and navigate the complexities of decentralized applications by determining their domains. In particular, we analyze code embedding of energy smart contracts and characterize their vulnerabilities in transactive energy systems. We conclude that energy contracts can be affected by a relatively large number of defects. It also appears that the detection accuracy of the tools varies depending on the domain. This suggests that security flaws may be domain-specific. As a result, in some domains, many vulnerabilities can be overlooked by existing analytical tools. Additionally, the overall impact of a specific vulnerability can differ significantly between domains, making its mitigation a priority subject to business logic. As a result, more effort should be directed towards the reliable and accurate detection of existing and new types of vulnerability from a domain-specific point of view.
随着区块链平台在各种去中心化应用程序中的广泛采用,智能合约的漏洞也在不断增长和演变。因此,传统漏洞分析方法的优化失败,会导致由于忽略了漏洞类别而导致不可预见的后果。目前的方法难以处理多方面的入侵,这需要更强大的方法。因此,在合约执行逻辑中过度依赖于环境定义的参数会将合约绑定到对这些参数的操作,并被视为安全漏洞。一些漏洞分析工具已经被认为不足以有效地识别某些类型的漏洞。在本文中,我们对智能合约上最先进的漏洞检测工具进行了特定领域的评估。一个领域可以被定义为一个特定的知识、专业知识或行业领域。我们使用特定于能源合同领域的视角来绘制逻辑和语言依赖特征,以推进对这些合同的结构和程序理解。我们的目标是达到更高的抽象程度,并通过确定分散的应用程序的域来处理它们的复杂性。特别是,我们分析了能源智能合约的代码嵌入,并描述了它们在交易能源系统中的漏洞。我们得出结论,能量契约可以受到相对大量缺陷的影响。此外,工具的检测精度也因领域而异。这表明安全缺陷可能是特定于领域的。因此,在某些领域,许多漏洞可能被现有的分析工具所忽略。此外,特定漏洞的总体影响在不同的域之间可能存在显著差异,因此对其缓解的优先级取决于业务逻辑。因此,应从特定领域的角度可靠和准确地检测现有的和新的脆弱性类型,应作出更多努力。
{"title":"Evaluation of Smart Contract Vulnerability Analysis Tools: A Domain-Specific Perspective","authors":"Bahareh Lashkari, Petr Musilek","doi":"10.3390/info14100533","DOIUrl":"https://doi.org/10.3390/info14100533","url":null,"abstract":"With the widespread adoption of blockchain platforms across various decentralized applications, the smart contract’s vulnerabilities are continuously growing and evolving. Consequently, a failure to optimize conventional vulnerability analysis methods results in unforeseen effects caused by overlooked classes of vulnerabilities. Current methods have difficulty dealing with multifaceted intrusions, which calls for more robust approaches. Therefore, overdependence on environment-defined parameters in the contract execution logic binds the contract to the manipulation of such parameters and is perceived as a security vulnerability. Several vulnerability analysis tools have been identified as insufficient to effectively identify certain types of vulnerability. In this paper, we perform a domain-specific evaluation of state-of-the-art vulnerability detection tools on smart contracts. A domain can be defined as a particular area of knowledge, expertise, or industry. We use a perspective specific to the area of energy contracts to draw logical and language-dependent features to advance the structural and procedural comprehension of these contracts. The goal is to reach a greater degree of abstraction and navigate the complexities of decentralized applications by determining their domains. In particular, we analyze code embedding of energy smart contracts and characterize their vulnerabilities in transactive energy systems. We conclude that energy contracts can be affected by a relatively large number of defects. It also appears that the detection accuracy of the tools varies depending on the domain. This suggests that security flaws may be domain-specific. As a result, in some domains, many vulnerabilities can be overlooked by existing analytical tools. Additionally, the overall impact of a specific vulnerability can differ significantly between domains, making its mitigation a priority subject to business logic. As a result, more effort should be directed towards the reliable and accurate detection of existing and new types of vulnerability from a domain-specific point of view.","PeriodicalId":38479,"journal":{"name":"Information (Switzerland)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135199873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information (Switzerland)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1