首页 > 最新文献

International Journal of Computers and Applications最新文献

英文 中文
Task scheduling and data replication in cloud with improved correlation strategy 通过改进的关联策略实现云中的任务调度和数据复制
Q2 Computer Science Pub Date : 2023-10-13 DOI: 10.1080/1206212x.2023.2267840
D Rambabu, A Govardhan
AbstractCloud providers frequently utilize two tightly coupled resource management strategies like task scheduling & data replication to boost the performance of the system generally, guaranteeing service level agreement (SLA) compliance, as well as protecting their own financial gain. An Improved Correlation strategy-based Task Scheduling and Data Replication in Cloud (ICTSDC) is what this work aims to give. The suggested system's primary phases are as follows: Management of replication and task scheduling. Initial job scheduling will be optimization-based and take into account goals such bottleneck value, migration cost, VM load, enhanced correlation, and replication, respectively. For this, a brand-new extended DMO algorithm called Self-adaptive Dwarf Mongoose Optimization (SADMO) is presented. In the replication management stage, the potential copies must first be identified based on the prior objective. The suggested SADMO model implements the optimization technique for replica placement throughout the replication management process. The outcomes of the ICTSDC technique are evaluated to other methods using a variety of metrics, like bottleneck value, migration cost, Virtual Machine (VM) load, improved correlation, as well as replication efficiency. A lower mean value of 0.324 is gained with the ICTSDC scheme for fitness.KEYWORDS: Task schedulingdata replicationcloudimproved correlationoptimization Disclosure statementNo potential conflict of interest was reported by the author(s).
摘要云提供商经常使用两种紧密耦合的资源管理策略,如任务调度和数据复制,以提高系统的性能,保证服务水平协议(SLA)的合规性,并保护自己的经济利益。一种改进的基于关联策略的任务调度和云中的数据复制(ICTSDC)是本研究的目标。建议系统的主要阶段包括:复制管理和任务调度。初始作业调度将基于优化,并分别考虑瓶颈值、迁移成本、VM负载、增强的相关性和复制等目标。为此,提出了一种全新的扩展DMO算法——自适应矮猫鼬优化算法(SADMO)。在复制管理阶段,必须首先根据先前的目标确定潜在的副本。建议的SADMO模型在整个复制管理过程中实现了副本放置的优化技术。使用瓶颈值、迁移成本、虚拟机(VM)负载、改进的相关性以及复制效率等各种指标,对ICTSDC技术的结果进行了评估。ICTSDC方案的适应度均值较低,为0.324。关键词:任务调度数据复制改进相关性优化披露声明作者未报告潜在利益冲突。
{"title":"Task scheduling and data replication in cloud with improved correlation strategy","authors":"D Rambabu, A Govardhan","doi":"10.1080/1206212x.2023.2267840","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2267840","url":null,"abstract":"AbstractCloud providers frequently utilize two tightly coupled resource management strategies like task scheduling & data replication to boost the performance of the system generally, guaranteeing service level agreement (SLA) compliance, as well as protecting their own financial gain. An Improved Correlation strategy-based Task Scheduling and Data Replication in Cloud (ICTSDC) is what this work aims to give. The suggested system's primary phases are as follows: Management of replication and task scheduling. Initial job scheduling will be optimization-based and take into account goals such bottleneck value, migration cost, VM load, enhanced correlation, and replication, respectively. For this, a brand-new extended DMO algorithm called Self-adaptive Dwarf Mongoose Optimization (SADMO) is presented. In the replication management stage, the potential copies must first be identified based on the prior objective. The suggested SADMO model implements the optimization technique for replica placement throughout the replication management process. The outcomes of the ICTSDC technique are evaluated to other methods using a variety of metrics, like bottleneck value, migration cost, Virtual Machine (VM) load, improved correlation, as well as replication efficiency. A lower mean value of 0.324 is gained with the ICTSDC scheme for fitness.KEYWORDS: Task schedulingdata replicationcloudimproved correlationoptimization Disclosure statementNo potential conflict of interest was reported by the author(s).","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135856862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discovery of interesting frequent item sets in an uncertain database using ant colony optimization 利用蚁群优化方法在不确定数据库中发现感兴趣的频繁项集
Q2 Computer Science Pub Date : 2023-10-09 DOI: 10.1080/1206212x.2023.2263689
Sridevi Malipatil, T. Hanumantha Reddy
ABSTRACTApplications like business basket analysis, digital service analytics, bio-informatics, and mobile commerce have greatly benefited from the information retrieval of significant features from massive databases for improved decision-making. Item set mining is used to find intriguing patterns in databases. Discovering item sets in an uncertain database is a tedious task. Only mathematical correlations between the elements in an item set are the exclusive subject of recurring item set mining research. The finding is direct to optimal. This article introduces an ant colony that maps the viable solution space to a directed graph with quadratic space complexity. The proposed model evaluates an uncertain transaction database's item set. Compared to the current methods, the findings demonstrate the importance of the proposed model.KEYWORDS: Patternsassociation rule miningfrequent itemsdatabase Disclosure statementNo potential conflict of interest was reported by the author(s).
摘要商业篮子分析、数字服务分析、生物信息学和移动商务等应用已经从海量数据库的重要特征信息检索中受益匪浅,从而改善了决策。项目集挖掘用于在数据库中发现有趣的模式。在不确定的数据库中发现项目集是一项繁琐的任务。只有项目集中元素之间的数学相关性是重复项目集挖掘研究的唯一主题。这一发现直接指向最优。本文介绍了一种蚁群算法,它将可行解空间映射到具有二次空间复杂度的有向图。该模型对不确定事务数据库的项目集进行评估。与现有方法相比,研究结果表明了所提出模型的重要性。关键词:模式关联规则挖掘频繁项数据库披露声明作者未报告潜在的利益冲突。
{"title":"Discovery of interesting frequent item sets in an uncertain database using ant colony optimization","authors":"Sridevi Malipatil, T. Hanumantha Reddy","doi":"10.1080/1206212x.2023.2263689","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2263689","url":null,"abstract":"ABSTRACTApplications like business basket analysis, digital service analytics, bio-informatics, and mobile commerce have greatly benefited from the information retrieval of significant features from massive databases for improved decision-making. Item set mining is used to find intriguing patterns in databases. Discovering item sets in an uncertain database is a tedious task. Only mathematical correlations between the elements in an item set are the exclusive subject of recurring item set mining research. The finding is direct to optimal. This article introduces an ant colony that maps the viable solution space to a directed graph with quadratic space complexity. The proposed model evaluates an uncertain transaction database's item set. Compared to the current methods, the findings demonstrate the importance of the proposed model.KEYWORDS: Patternsassociation rule miningfrequent itemsdatabase Disclosure statementNo potential conflict of interest was reported by the author(s).","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135093214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multimodal deep learning for chronic kidney disease prediction: leveraging feature selection algorithms and ensemble models 多模态深度学习用于慢性肾脏疾病预测:利用特征选择算法和集成模型
Q2 Computer Science Pub Date : 2023-10-03 DOI: 10.1080/1206212x.2023.2262786
N. J. Subashini, K. Venkatesh
ABSTRACTThis research presents an advanced approach to enhance disease diagnosis using imbalanced medical datasets. Feature selection techniques, LASSO and Relief, are applied to identify relevant features from the UCI dataset and missing values are handled appropriately. To address the class imbalance, SMOTEENN is used, creating a new combined dataset with selected features. Three deep learning models, FNNs, LSTMs, and GBMs, are employed and trained on the combined dataset, achieving remarkable accuracy (1.0). Evaluating the models on LASSO and Relief datasets independently, FNN/MLP obtains perfect accuracy, GBM performs well (0.9888 on LASSO and 1.0 on Relief), and LSTM shows good results (0.9663 on LASSO and 1.0 on Relief). This study demonstrates the effectiveness of combining LASSO and Relief for feature selection and highlights the impact of SMOTEENN on model performance. The achieved accuracy with all models on the combined dataset showcases deep learning's potential for accurate disease diagnosis even with imbalanced data, offering promising insights for robust medical diagnosis systems.KEYWORDS: Chronic kidney diseaseMultimodal deep learningLASSOReliefSMOTEENN Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsN. J. SubashiniN. J. Subashini is a Research scholar in Networking and Communications department, SRM Institute of Science and Technology. Her research interests include Data Mining, Artificial Intelligence, Deep Learning and Machine Learning.K. VenkateshK. Venkatesh is Associate Professor in Networking and Communications department, SRM Institute of Science and Technology. His research interests include Networking, Cloud Computing, Data Mining, Artificial Intelligence, and Machine Learning. He is the Program Coordinator for B. Tech CSE specialization with a focus on Computer Networking. Additionally, he serves as an Alumni Coordinator in the Department of Networking and Communications. He is a Cisco certified CCNA Lead Instructor and Academy Contact for SRM Institute of Science and Technology, formerly known as SRM University, Networking Academy.
摘要本文提出了一种利用不平衡医疗数据集增强疾病诊断的先进方法。特征选择技术LASSO和Relief用于识别UCI数据集中的相关特征,并对缺失值进行适当处理。为了解决类不平衡问题,使用SMOTEENN,创建一个具有选定特征的新组合数据集。采用fnn、lstm和gbm三种深度学习模型对组合数据集进行训练,获得了显著的准确率(1.0)。在LASSO和Relief数据集上独立评估模型,FNN/MLP获得了较好的准确率,GBM表现良好(LASSO上0.9888,Relief上1.0),LSTM表现良好(LASSO上0.9663,Relief上1.0)。本研究证明了LASSO和Relief相结合的特征选择的有效性,并强调了SMOTEENN对模型性能的影响。综合数据集上所有模型的准确性表明,即使在数据不平衡的情况下,深度学习也有可能准确诊断疾病,这为强大的医疗诊断系统提供了有希望的见解。关键词:慢性肾脏疾病多模式深度学习lassoreliefsmotenn披露声明作者未报告潜在的利益冲突。其他信息:贡献者说明j . SubashiniN。苏巴什尼是SRM科学技术研究所网络与通信系的研究学者。她的研究兴趣包括数据挖掘、人工智能、深度学习和机器学习。VenkateshK。文卡特什是SRM科学技术研究所网络与通信系副教授。他的研究兴趣包括网络、云计算、数据挖掘、人工智能和机器学习。他是B. Tech CSE专业的项目协调员,专注于计算机网络。此外,他还担任网络和通信部门的校友协调员。他是思科认证的CCNA首席讲师和SRM科学技术研究所(前身为SRM大学,网络学院)的学院联系人。
{"title":"Multimodal deep learning for chronic kidney disease prediction: leveraging feature selection algorithms and ensemble models","authors":"N. J. Subashini, K. Venkatesh","doi":"10.1080/1206212x.2023.2262786","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2262786","url":null,"abstract":"ABSTRACTThis research presents an advanced approach to enhance disease diagnosis using imbalanced medical datasets. Feature selection techniques, LASSO and Relief, are applied to identify relevant features from the UCI dataset and missing values are handled appropriately. To address the class imbalance, SMOTEENN is used, creating a new combined dataset with selected features. Three deep learning models, FNNs, LSTMs, and GBMs, are employed and trained on the combined dataset, achieving remarkable accuracy (1.0). Evaluating the models on LASSO and Relief datasets independently, FNN/MLP obtains perfect accuracy, GBM performs well (0.9888 on LASSO and 1.0 on Relief), and LSTM shows good results (0.9663 on LASSO and 1.0 on Relief). This study demonstrates the effectiveness of combining LASSO and Relief for feature selection and highlights the impact of SMOTEENN on model performance. The achieved accuracy with all models on the combined dataset showcases deep learning's potential for accurate disease diagnosis even with imbalanced data, offering promising insights for robust medical diagnosis systems.KEYWORDS: Chronic kidney diseaseMultimodal deep learningLASSOReliefSMOTEENN Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsN. J. SubashiniN. J. Subashini is a Research scholar in Networking and Communications department, SRM Institute of Science and Technology. Her research interests include Data Mining, Artificial Intelligence, Deep Learning and Machine Learning.K. VenkateshK. Venkatesh is Associate Professor in Networking and Communications department, SRM Institute of Science and Technology. His research interests include Networking, Cloud Computing, Data Mining, Artificial Intelligence, and Machine Learning. He is the Program Coordinator for B. Tech CSE specialization with a focus on Computer Networking. Additionally, he serves as an Alumni Coordinator in the Department of Networking and Communications. He is a Cisco certified CCNA Lead Instructor and Academy Contact for SRM Institute of Science and Technology, formerly known as SRM University, Networking Academy.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135738729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine failure prediction using joint reserve intelligence with feature selection technique 基于联合储备智能和特征选择技术的机器故障预测
Q2 Computer Science Pub Date : 2023-10-03 DOI: 10.1080/1206212x.2023.2260619
Amal Shaheen, Mustafa Hammad, Wael Elmedany, Riadh Ksantini, Saeed Sharif
A model with high accuracy of machine failure prediction is important for any machine life cycle. In this paper, a prediction model based on machine learning methods is proposed. The used method is a combination of machine learning algorithms and techniques. The machine learning algorithm is a data mining technique that has been widely used as a prediction model for classifying problems. Five algorithms have been tested including JRIP, logistic, KStar, Bayes network and decision table machine learning. The evaluation process is done by applying the algorithms on a predictive dataset using different performance measures. In the proposed model, the feature selection and voting techniques are used and applied in the classification process for each classifier. From the comparison of the result, the feature selection shows the best performance result. Paired t-test evaluation measures were considered to confirm our conclusion. The best accuracy result among the five classifiers shows that joint reserve intelligence classifier can be used to predict the failure with an accuracy high as 0.983. Applying classifier subset evaluation using the JRIP classifier can enhance the accuracy result to be 0.985. The finding shows that the proposed model improves the results of the classifiers.
对于任何机械寿命周期,高精度的机械故障预测模型都是非常重要的。本文提出了一种基于机器学习方法的预测模型。所使用的方法是机器学习算法和技术的结合。机器学习算法是一种数据挖掘技术,已被广泛用作分类问题的预测模型。测试了五种算法,包括JRIP, logistic, KStar,贝叶斯网络和决策表机器学习。评估过程是通过使用不同的性能度量将算法应用于预测数据集来完成的。在该模型中,特征选择和投票技术被应用到每个分类器的分类过程中。从结果的比较来看,特征选择显示出最佳的性能结果。采用配对t检验评价措施来证实我们的结论。5种分类器中准确率最高的结果表明,联合储备智能分类器可用于故障预测,准确率高达0.983。使用JRIP分类器进行分类器子集评价,可将准确率提高到0.985。结果表明,该模型改善了分类器的分类结果。
{"title":"Machine failure prediction using joint reserve intelligence with feature selection technique","authors":"Amal Shaheen, Mustafa Hammad, Wael Elmedany, Riadh Ksantini, Saeed Sharif","doi":"10.1080/1206212x.2023.2260619","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2260619","url":null,"abstract":"A model with high accuracy of machine failure prediction is important for any machine life cycle. In this paper, a prediction model based on machine learning methods is proposed. The used method is a combination of machine learning algorithms and techniques. The machine learning algorithm is a data mining technique that has been widely used as a prediction model for classifying problems. Five algorithms have been tested including JRIP, logistic, KStar, Bayes network and decision table machine learning. The evaluation process is done by applying the algorithms on a predictive dataset using different performance measures. In the proposed model, the feature selection and voting techniques are used and applied in the classification process for each classifier. From the comparison of the result, the feature selection shows the best performance result. Paired t-test evaluation measures were considered to confirm our conclusion. The best accuracy result among the five classifiers shows that joint reserve intelligence classifier can be used to predict the failure with an accuracy high as 0.983. Applying classifier subset evaluation using the JRIP classifier can enhance the accuracy result to be 0.985. The finding shows that the proposed model improves the results of the classifiers.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135696469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple paddy disease recognition methods based on deformable transformer attention mechanism in complex scenarios 复杂场景下基于变形变压器注意机制的多种水稻病害识别方法
Q2 Computer Science Pub Date : 2023-10-03 DOI: 10.1080/1206212x.2023.2263254
Xinyu Zhang, Hang Dong, Liang Gong, Xin Cheng, Zhenghui Ge, Liangchao Guo
AbstractPaddy disease recognition presents challenges in the agricultural industry, and existing algorithms struggle to accurately identify diseases in complex scenarios. In this paper, we propose a precise object detection framework to address the challenges of severe overlap, multi-disease detection, morphological irregularities, multi-scale object classification, and complex scenarios in real-world environments in paddy disease detection. The proposed model is based on an improved version of the DEtection TRansformer (Detr) algorithm. The enhanced network architecture fuses multi-scale features by adding a feature fusion module after the backbone network, which is able to retain more original information of the images and greatly improves the detection accuracy; the use of deformable attention module greatly reduces the computational complexity of the model. To evaluate the PDN, a dedicated paddy disease detection dataset with 1200 images is created. Experimental results demonstrate that the proposed model obtained a precision value of 100%, a recall value of 89.3%, F1-score of 94.3%, and a mean average precision (mAP) value of 60.2%. The model outperforms the existing state-of-the-art detection models in detection accuracy.KEYWORDS: Paddy disease recognitionTransformermachine vision detection Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported in part by the Jiangsu Basic Science (Natural Science) Research Projects in Higher Education Institutions (No.23KJB460034), Jiangsu province Youth Fund Project (No.BK2023040059), the China Postdoctoral Science Foundation Funded Project (No. 2022M721185), Jiangsu Agriculture Science and Technology Innovation Fund (No. CX(21)3145).Notes on contributorsXinyu ZhangXinyu Zhang is currently a master's student in mechanical engineering at the School of Mechanical Engineering, Yangzhou University. His research interest is machine learning.Hang DongDr. Hang Dong is a lecturer at Yangzhou University. He received his PhD degree in Mechanical Manufacture and Automation from Dalian University of Technology (2019). His research interests include the deep learning, machine learning, and robotics. Hang Dong is the corresponding author and can be contacted at hdong@yzu.edu.cn.Liang GongLiang Gong was born in Maanshan City, Anhui Province, China on October 26, 1999. He received his bachelor's degree from Anhui Polytechnic University in 2021. He is currently a master's student in mechanical engineering at the School of Mechanical Engineering, Yangzhou University. His research interests are machine vision and machine learning.Xin ChengXin Cheng was born in Lian Yungang, China, in 2002.He is currently a student in Yangzhou University.His research interests include computer vision,natural language processing.Zhenghui GeZhenghui Ge is currently an associate professor at Yangzhou University, China. He received his PhD degree from Nanjing Unive
摘要水稻病害识别在农业领域面临挑战,现有算法难以在复杂场景下准确识别病害。针对水稻病害检测中存在的严重重叠、多病害检测、形态不规则、多尺度目标分类和复杂场景等问题,提出了一种精确的目标检测框架。提出的模型是基于检测变压器(Detr)算法的改进版本。改进后的网络架构通过在骨干网后增加特征融合模块融合多尺度特征,能够保留更多图像的原始信息,大大提高检测精度;可变形注意力模块的使用大大降低了模型的计算复杂度。为了评估PDN,创建了一个包含1200张图像的专用水稻病害检测数据集。实验结果表明,该模型的准确率为100%,召回率为89.3%,f1分数为94.3%,平均精度(mAP)为60.2%。该模型在检测精度上优于现有的最先进的检测模型。关键词:水稻疾病识别变压器机器视觉检测披露声明作者未报告潜在利益冲突。项目资助:江苏省高校基础科学(自然科学)研究项目(No. 23kjb460034)、江苏省青年基金项目(No. bk2023040059)、中国博士后科学基金项目(No. 2022M721185)、江苏省农业科技创新基金项目(No. 2022M721185)。残雪(21)3145)。作者简介张新宇张新宇现任扬州大学机械工程学院机械工程专业硕士研究生。他的研究兴趣是机器学习。挂DongDr。董航是扬州大学的讲师。2019年毕业于大连理工大学机械制造及自动化专业,获博士学位。他的研究兴趣包括深度学习、机器学习和机器人技术。董航,通讯作者,联系邮箱:hdong@yzu.edu.cn.Liang龚亮,1999年10月26日出生于中国安徽省马鞍山市。他于2021年获得安徽工业大学学士学位。他目前是扬州大学机械工程学院机械工程专业的硕士研究生。主要研究方向为机器视觉和机器学习。辛成,2002年出生于中国连云港。他现在是扬州大学的学生。主要研究方向为计算机视觉、自然语言处理。葛正辉,现任中国扬州大学副教授。2018年获南京航空航天大学博士学位。主要研究方向为电化学加工。Liangchao GuoDr。郭良超,扬州大学杰出研究员。2019年毕业于大连理工大学机械制造及自动化专业,获博士学位。他的研究兴趣包括气体传感和存储器件的制造和应用。
{"title":"Multiple paddy disease recognition methods based on deformable transformer attention mechanism in complex scenarios","authors":"Xinyu Zhang, Hang Dong, Liang Gong, Xin Cheng, Zhenghui Ge, Liangchao Guo","doi":"10.1080/1206212x.2023.2263254","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2263254","url":null,"abstract":"AbstractPaddy disease recognition presents challenges in the agricultural industry, and existing algorithms struggle to accurately identify diseases in complex scenarios. In this paper, we propose a precise object detection framework to address the challenges of severe overlap, multi-disease detection, morphological irregularities, multi-scale object classification, and complex scenarios in real-world environments in paddy disease detection. The proposed model is based on an improved version of the DEtection TRansformer (Detr) algorithm. The enhanced network architecture fuses multi-scale features by adding a feature fusion module after the backbone network, which is able to retain more original information of the images and greatly improves the detection accuracy; the use of deformable attention module greatly reduces the computational complexity of the model. To evaluate the PDN, a dedicated paddy disease detection dataset with 1200 images is created. Experimental results demonstrate that the proposed model obtained a precision value of 100%, a recall value of 89.3%, F1-score of 94.3%, and a mean average precision (mAP) value of 60.2%. The model outperforms the existing state-of-the-art detection models in detection accuracy.KEYWORDS: Paddy disease recognitionTransformermachine vision detection Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported in part by the Jiangsu Basic Science (Natural Science) Research Projects in Higher Education Institutions (No.23KJB460034), Jiangsu province Youth Fund Project (No.BK2023040059), the China Postdoctoral Science Foundation Funded Project (No. 2022M721185), Jiangsu Agriculture Science and Technology Innovation Fund (No. CX(21)3145).Notes on contributorsXinyu ZhangXinyu Zhang is currently a master's student in mechanical engineering at the School of Mechanical Engineering, Yangzhou University. His research interest is machine learning.Hang DongDr. Hang Dong is a lecturer at Yangzhou University. He received his PhD degree in Mechanical Manufacture and Automation from Dalian University of Technology (2019). His research interests include the deep learning, machine learning, and robotics. Hang Dong is the corresponding author and can be contacted at hdong@yzu.edu.cn.Liang GongLiang Gong was born in Maanshan City, Anhui Province, China on October 26, 1999. He received his bachelor's degree from Anhui Polytechnic University in 2021. He is currently a master's student in mechanical engineering at the School of Mechanical Engineering, Yangzhou University. His research interests are machine vision and machine learning.Xin ChengXin Cheng was born in Lian Yungang, China, in 2002.He is currently a student in Yangzhou University.His research interests include computer vision,natural language processing.Zhenghui GeZhenghui Ge is currently an associate professor at Yangzhou University, China. He received his PhD degree from Nanjing Unive","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135745014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective cloud load-balancing with hybrid optimization 混合优化的多目标云负载均衡
Q2 Computer Science Pub Date : 2023-09-28 DOI: 10.1080/1206212x.2023.2260616
Koppula Geeta, V. Kamakshi Prasad
AbstractIn this study, the cloud computing platform is equipped with a hybrid multi-objective meta-heuristic optimization-based load balancing model. Physical Machine (PM) allocates a specific virtual machine (VM) depending on multiple criteria, such as the amount of memory used, migration expenses, power usage, and the load balancing settings, upon receiving a request to handle a cloud user's duties (‘Response time, Turnaround time, and Server load’). Additionally, the optimal virtual machine (VM) is chosen for efficient load balancing by utilizing the recently proposed hybrid optimization approach. The Cat and Mouse-Based Optimizer (CMBO) and Standard Dingo Optimizer (DXO) are conceptually blended together to get the proposed hybridization method known as Dingo Customized Cat mouse Optimization (DCCO). The developed method achieves the lowest server load in cloud environment 1 is 33.3%, 40%, 42.3%, 40.2%, 36.8%, 42.5%, 50%, 40.2%, 39.2% improved over MOA, ABC, CSO, SSO, SSA, ACSO, SMO, CMBO, BOA, DOX, and FF-PSO, respectively. Finally, the projected DCCO model has been evaluated in terms of makespan, memory usage, migration cost, response time, usage of power server load, turnaround time, throughput, and convergence.ABBREVIATION: CDC, cloud data center; CMODLB, Clustering-based Multiple Objective Dynamic Load Balancing As A Load Balancing; CSP, Cloud service providers; CSSA, Chaotic Squirrel Search Algorithm; DA, Dragonfly Algorithm; ED, Euclidean Distance; EDA-GA, Estimation Of Distribution Algorithm And GA; FF, FireFly algorithm; GA, Genetic Algorithm; HHO, Harris Hawk Optimization; IaaS, Infrastructure-as-a-Service; MGWO, Modified Mean Grey Wolf Optimization Algorithm; MMHHO, Mantaray modified multi-objective Harris Hawk optimization; MRFO, Manta Ray Forging Optimization; PaaS, Platform-as-a-Service; PM, Physical Machine; PSO, Particle Swarm Optimization; SaaS, Software-as-a-Service; SAW, Sample additive weighting; SLA-LB, Service Level Agreement-Based Load Balancing; TBTS, Threshold-Based Task Scheduling Algorithm; TS, Task SchedulingKEYWORDS: Cloud computingload balancingDCCOpower consumptionmemory utilizationmigration cost Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsKoppula GeetaKoppula Geeta, Currently working as Assistant Professor of Computer Science & Engineering at Rajiv Gandhi University of Knowledge Technologies Basar, She is having 18 years of teaching experience. Received her B.Tech, M.Tech from JNTUH. Currently she is pursuing PhD in JNTUH, Hyderabad. Her main research interests includes Cloud computing, Data mining.V. Kamakshi PrasadProfessor V. Kamakshi Prasad currently serving as a Senior Professor of Computer Science & Engineering at JNTUH College of Engineering Science & Technology in Hyderabad, has 31 years of teaching and research experience. He obtained his B.Tech., M.Tech., and Ph.D. degrees from KLCE, Andhra University College of Enginee
摘要本研究在云计算平台上配置了一种基于混合多目标元启发式优化的负载均衡模型。物理机(PM)在收到处理云用户职责(“响应时间、周转时间和服务器负载”)的请求时,根据多个标准分配特定的虚拟机(VM),例如使用的内容量、迁移费用、电力使用和负载平衡设置。此外,利用最近提出的混合优化方法,选择最优虚拟机(VM)进行有效的负载均衡。基于猫和老鼠的优化器(CMBO)和标准野狗优化器(DXO)在概念上混合在一起,得到了被称为野狗定制猫老鼠优化(DCCO)的杂交方法。与MOA、ABC、CSO、SSO、SSA、ACSO、SMO、CMBO、BOA、DOX和FF-PSO相比,该方法在云环境1中的最低服务器负载分别提高了33.3%、40%、42.3%、40.2%、36.8%、42.5%、50%、40.2%、39.2%。最后,根据makespan、内存使用、迁移成本、响应时间、电源服务器负载的使用、周转时间、吞吐量和收敛性对预测的DCCO模型进行了评估。简称:CDC,云数据中心;基于聚类的多目标动态负载均衡(CMODLB)CSP,云服务提供商;混沌松鼠搜索算法;DA,蜻蜓算法;ED,欧氏距离;EDA-GA、分布估计算法与遗传算法FF, FireFly算法;遗传算法;HHO,哈里斯鹰优化;IaaS,“基础架构即服务”;修正平均灰狼优化算法;MMHHO, Mantaray改进的多目标Harris Hawk优化;Manta Ray锻造优化;PaaS平台;PM,物理机;粒子群优化;SaaS(软件即服务);SAW,样品添加剂称重;SLA-LB,基于服务水平协议的负载均衡;基于阈值的任务调度算法;关键词:云计算负载平衡dccp功耗内存利用率迁移成本披露声明作者未报告潜在的利益冲突。作者简介:目前在拉吉夫甘地知识技术大学担任计算机科学与工程助理教授,她有18年的教学经验。获南京理工大学理学士、理硕士学位。目前,她正在海德拉巴的JNTUH攻读博士学位。她的主要研究兴趣包括云计算、数据挖掘。V. Kamakshi Prasad教授,现任海德拉巴JNTUH工程科学与技术学院计算机科学与工程高级教授,拥有31年的教学和研究经验。他获得了学士学位。, M.Tech。分别获得印度理工学院、安得拉邦大学工程学院和印度理工学院马德拉斯分校的博士学位。1992年任南京理工大学副教授,2003年、2006年、2016年先后晋升为副教授、教授、高级教授。在他任职期间,他在大学担任过各种行政职务,包括额外的考试总监,TEQIP-II协调员,CSE部门负责人,考试总监,创新技术总监,评估总监,目前担任CSE和CSE联合分支机构的研究委员会主席。此外,他还积极参与研究委员会,学术委员会,以及JNTUH和其他大学附属的几所自治和非自治学院的管理机构。他还曾担任海得拉巴MANUU执行委员会的访客(印度总统)提名人,以及海得拉巴中央大学计算机与信息科学学院(SCIS)的董事会成员。为了表彰他的贡献,他获得了特伦甘纳邦政府颁发的2020年州教师奖。他的研究兴趣涵盖了广泛的领域,包括量子计算、机器学习、数据挖掘、语音和图像处理以及理论计算机科学。指导博士研究生29人,硕士研究生3人,目前指导博士研究生8人。
{"title":"Multi-objective cloud load-balancing with hybrid optimization","authors":"Koppula Geeta, V. Kamakshi Prasad","doi":"10.1080/1206212x.2023.2260616","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2260616","url":null,"abstract":"AbstractIn this study, the cloud computing platform is equipped with a hybrid multi-objective meta-heuristic optimization-based load balancing model. Physical Machine (PM) allocates a specific virtual machine (VM) depending on multiple criteria, such as the amount of memory used, migration expenses, power usage, and the load balancing settings, upon receiving a request to handle a cloud user's duties (‘Response time, Turnaround time, and Server load’). Additionally, the optimal virtual machine (VM) is chosen for efficient load balancing by utilizing the recently proposed hybrid optimization approach. The Cat and Mouse-Based Optimizer (CMBO) and Standard Dingo Optimizer (DXO) are conceptually blended together to get the proposed hybridization method known as Dingo Customized Cat mouse Optimization (DCCO). The developed method achieves the lowest server load in cloud environment 1 is 33.3%, 40%, 42.3%, 40.2%, 36.8%, 42.5%, 50%, 40.2%, 39.2% improved over MOA, ABC, CSO, SSO, SSA, ACSO, SMO, CMBO, BOA, DOX, and FF-PSO, respectively. Finally, the projected DCCO model has been evaluated in terms of makespan, memory usage, migration cost, response time, usage of power server load, turnaround time, throughput, and convergence.ABBREVIATION: CDC, cloud data center; CMODLB, Clustering-based Multiple Objective Dynamic Load Balancing As A Load Balancing; CSP, Cloud service providers; CSSA, Chaotic Squirrel Search Algorithm; DA, Dragonfly Algorithm; ED, Euclidean Distance; EDA-GA, Estimation Of Distribution Algorithm And GA; FF, FireFly algorithm; GA, Genetic Algorithm; HHO, Harris Hawk Optimization; IaaS, Infrastructure-as-a-Service; MGWO, Modified Mean Grey Wolf Optimization Algorithm; MMHHO, Mantaray modified multi-objective Harris Hawk optimization; MRFO, Manta Ray Forging Optimization; PaaS, Platform-as-a-Service; PM, Physical Machine; PSO, Particle Swarm Optimization; SaaS, Software-as-a-Service; SAW, Sample additive weighting; SLA-LB, Service Level Agreement-Based Load Balancing; TBTS, Threshold-Based Task Scheduling Algorithm; TS, Task SchedulingKEYWORDS: Cloud computingload balancingDCCOpower consumptionmemory utilizationmigration cost Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsKoppula GeetaKoppula Geeta, Currently working as Assistant Professor of Computer Science & Engineering at Rajiv Gandhi University of Knowledge Technologies Basar, She is having 18 years of teaching experience. Received her B.Tech, M.Tech from JNTUH. Currently she is pursuing PhD in JNTUH, Hyderabad. Her main research interests includes Cloud computing, Data mining.V. Kamakshi PrasadProfessor V. Kamakshi Prasad currently serving as a Senior Professor of Computer Science & Engineering at JNTUH College of Engineering Science & Technology in Hyderabad, has 31 years of teaching and research experience. He obtained his B.Tech., M.Tech., and Ph.D. degrees from KLCE, Andhra University College of Enginee","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135385411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast image encryption algorithm with random structures 随机结构快速图像加密算法
Q2 Computer Science Pub Date : 2023-09-27 DOI: 10.1080/1206212x.2023.2260617
Taha Etem, Turgay Kaya
AbstractBlock encryption algorithms are among the most preferred applications in cryptographic systems. Block ciphers should have accomplished some requirements for a secure communication system. They should be evaluated in terms of cryptanalysis methods for widespread usage. The aim of this paper is to introduce a new secure and fast block encryption algorithm for images. For this purpose, a new block cipher, which offers an innovative encryption structure for key generation systems and can use S-boxes with different methods, is proposed. A Dynamic S-Box is used in the algorithm for both substitution and key generation purposes. Linear and differential cryptanalysis methods were performed successfully. UACI and NPCR tests show that the proposed symmetric block cipher algorithm is compatible with image encryption systems. The 512-bit key length provides the highest security for block encryption. Additionally, information entropy test, correlation coefficients, mean-squared error, and peak signal-to-noise ratio analyses were concluded successfully. The novelty of the paper is building a cryptanalysis attack-resistant block cipher algorithm that presents a lightweight cryptographic solution for image encryption systems.KEYWORDS: Block ciphersymmetric encryptionS-BoxNPCR and UACIimage processing AcknowledgementsThis study has been produced from the doctoral dissertation of Taha Etem. Authors’ contributions: T.E. conceived and designed the analysis, collected the data, contributed analysis tools, and wrote the paper. T.K. edited the paper, controlled the analysis, and supervised.Disclosure statementNo potential conflict of interest was reported by the author(s).Availability of data and materialData sharing is not applicable to this article as no new data were created or analyzed in this study.Additional informationNotes on contributorsTaha EtemTaha Etem received the B.Sc. degree in Electrical-Electronics Engineering from Firat University, Elazig, Turkey, in 2013, and the M.Sc. degree in Electrical-Electronics Engineering from Inonu University, Malatya, Turkey, in 2017, and received the Ph.D. degree in Electrical-Electronics Engineering from Firat University, Elazig, Turkey, in 2022. He was with Cankiri Karatekin University, Cankiri, Turkey, as a Faculty Member. He is currently an Assistant Professor in the Computer Engineering Department. His research interests include encryption systems, random number generators and radio-frequency systems.Turgay KayaTurgay Kaya was born in Elazig, Turkey, in 1982. He received the B.Sc., M.Sc. and Ph.D. degrees in electrical-electronics engineering from the Firat University in 2003, 2006 and 2011, respectively. From 2004 to 20013, he was a Research Assistant at department of electrical-electronics engineering, Firat University, Elazig, Turkey. Since 2013, he has been an Associate Professor same department. His research interests include digital and analog filter design, biomedical signal processing, signal and image
摘要块加密算法是密码系统中最受欢迎的应用之一。分组密码应该已经完成了安全通信系统的一些要求。它们应该根据广泛使用的密码分析方法进行评估。本文的目的是提出一种新的安全、快速的图像块加密算法。为此,提出了一种新的分组密码,它为密钥生成系统提供了一种创新的加密结构,并且可以使用不同方法的s -box。在算法中,动态s盒用于替换和密钥生成目的。成功地进行了线性和差分密码分析方法。UACI和NPCR测试表明,所提出的对称分组密码算法与图像加密系统兼容。512位的密钥长度为块加密提供了最高的安全性。此外,还成功地完成了信息熵检验、相关系数、均方误差和峰值信噪比分析。本文的新颖之处在于构建了一种抗密码分析攻击的分组密码算法,为图像加密系统提供了一种轻量级的密码解决方案。关键词:分组密码对称加密- boxnpcr和uaci图像处理作者贡献:T.E.构思并设计了分析,收集了数据,提供了分析工具,并撰写了论文。T.K.编辑论文,控制分析,并监督。披露声明作者未报告潜在的利益冲突。数据和材料的可用性数据共享不适用于本文,因为本研究没有创建或分析新的数据。taha Etem, 2013年获得土耳其埃拉齐格Firat大学电气电子工程学士学位,2017年获得土耳其马拉提亚Inonu大学电气电子工程硕士学位,2022年获得土耳其埃拉齐格Firat大学电气电子工程博士学位。他曾在土耳其坎基里的坎基里空手道大学担任教员。他目前是计算机工程系助理教授。他的研究兴趣包括加密系统,随机数发生器和射频系统。Turgay Kaya于1982年出生在土耳其的Elazig。他分别于2003年、2006年和2011年获得Firat University电气电子工程学士学位、硕士学位和博士学位。从2004年到20013年,他是土耳其埃拉兹格Firat大学电气电子工程系的研究助理。2013年至今,任系副教授。他的研究兴趣包括数字和模拟滤波器设计、生物医学信号处理、信号和图像处理、微处理、人工智能、启发式优化。
{"title":"Fast image encryption algorithm with random structures","authors":"Taha Etem, Turgay Kaya","doi":"10.1080/1206212x.2023.2260617","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2260617","url":null,"abstract":"AbstractBlock encryption algorithms are among the most preferred applications in cryptographic systems. Block ciphers should have accomplished some requirements for a secure communication system. They should be evaluated in terms of cryptanalysis methods for widespread usage. The aim of this paper is to introduce a new secure and fast block encryption algorithm for images. For this purpose, a new block cipher, which offers an innovative encryption structure for key generation systems and can use S-boxes with different methods, is proposed. A Dynamic S-Box is used in the algorithm for both substitution and key generation purposes. Linear and differential cryptanalysis methods were performed successfully. UACI and NPCR tests show that the proposed symmetric block cipher algorithm is compatible with image encryption systems. The 512-bit key length provides the highest security for block encryption. Additionally, information entropy test, correlation coefficients, mean-squared error, and peak signal-to-noise ratio analyses were concluded successfully. The novelty of the paper is building a cryptanalysis attack-resistant block cipher algorithm that presents a lightweight cryptographic solution for image encryption systems.KEYWORDS: Block ciphersymmetric encryptionS-BoxNPCR and UACIimage processing AcknowledgementsThis study has been produced from the doctoral dissertation of Taha Etem. Authors’ contributions: T.E. conceived and designed the analysis, collected the data, contributed analysis tools, and wrote the paper. T.K. edited the paper, controlled the analysis, and supervised.Disclosure statementNo potential conflict of interest was reported by the author(s).Availability of data and materialData sharing is not applicable to this article as no new data were created or analyzed in this study.Additional informationNotes on contributorsTaha EtemTaha Etem received the B.Sc. degree in Electrical-Electronics Engineering from Firat University, Elazig, Turkey, in 2013, and the M.Sc. degree in Electrical-Electronics Engineering from Inonu University, Malatya, Turkey, in 2017, and received the Ph.D. degree in Electrical-Electronics Engineering from Firat University, Elazig, Turkey, in 2022. He was with Cankiri Karatekin University, Cankiri, Turkey, as a Faculty Member. He is currently an Assistant Professor in the Computer Engineering Department. His research interests include encryption systems, random number generators and radio-frequency systems.Turgay KayaTurgay Kaya was born in Elazig, Turkey, in 1982. He received the B.Sc., M.Sc. and Ph.D. degrees in electrical-electronics engineering from the Firat University in 2003, 2006 and 2011, respectively. From 2004 to 20013, he was a Research Assistant at department of electrical-electronics engineering, Firat University, Elazig, Turkey. Since 2013, he has been an Associate Professor same department. His research interests include digital and analog filter design, biomedical signal processing, signal and image","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135539022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Background initialization in video data using singular value decomposition and robust principal component analysis 基于奇异值分解和鲁棒主成分分析的视频数据背景初始化
Q2 Computer Science Pub Date : 2023-09-19 DOI: 10.1080/1206212x.2023.2258329
Vishruth B. Gowda, M. T. Gopalakrishna, J. Megha, Shilpa Mohankumar
AbstractBackground initialization is used in video processing applications to extract a scene without the foreground scene. In recent times, the issue of background initialization has gained researchers’ attention in different fields such as video surveillance, video segmentation, computational photography, and so on. The initialization of the background is affected due to different complex dissimilarities such as shadow, intermittent movement, illumination, camera jitter, and clutter. To overcome the aforementioned issues, this paper proposes a decomposition using the combination of the Singular Value Decomposition (SVD) and Robust Principal Component Analysis (RPCA) for Singular Spectrum Analysis (SSA) to perform an effective background initialization. The incorporation of RPCA in SVD is used to overcome the issues related to non-Gaussian noise and it also uses an effective structural knowledge of the video input i.e. sparse and low rank matrix which improves the Peak-Signal-to-Noise-Ratio (PSNR) of the background image. The SBI dataset was used to analyze the performances of SSA-SVDRPCA. The SSA-SVDRPCA is analyzed using MultiScale Structural Similarity Index (MSSSIM), Average gray-level error (AGE), Percentage of clustered error pixels (pCEPS), Percentage of error pixels (pEPs), and PSNR. The existing approaches such as Background Initialization Singular Spectrum Analysis (BISSA) and Quaternion-based Dynamic Mode Decomposition (Q-DMD) are used to compare with the SSA-SVDRPCA method. The PSNR of the SSA-SVDRPCA for Board class is 30.39 dB which is higher than the BISSA and Q-DMD.KEYWORDS: Background initializationdecompositionpeak-signal-to-noise-ratiorobust principal component analysissingular spectrum analysissingular value decomposition Disclosure statementNo potential conflict of interest was reported by the author(s).Data availability statementThe datasets generated during and/or analyzed during the current study are available in the Scene Background Initialization (SBI) dataset.SBI datasethttps://sbmi2015.na.icar.cnr.it/SBIdataset.htmlAdditional informationNotes on contributorsVishruth B. GowdaVishruth B. Gowda completed his BE in AIEMS, bangalore, karnataka and Mtech from EWIT. He currently works as an assistant professor in Department of ISE,SJB Institute of technology. He is also pursuing his research in VTU, Belagavi, Karnataka under the supervision of Dr. M T Gopalakrishna. His research area falls under the domain of comuter vision and image processing.M. T. GopalakrishnaM. T. Gopalakrishna received B. E degree (Computer Science & Engineering) from M. S Ramaiah Institute of Technology, India, M. Tech degree from Visvesvaraya Technological University, Karnataka, India and PhD from Visvesvaraya Technological University, Karnataka, India. He has more than 22 years of teaching experience. He is currently Professor & Head, Department of Artificial Intelligence and Machine Learning in SJB Institute of Technology, Bangalore, India. He has
摘要背景初始化在视频处理应用中用于提取没有前景的场景。近年来,背景初始化问题在视频监控、视频分割、计算摄影等不同领域受到了研究人员的关注。背景的初始化受到各种复杂差异的影响,如阴影、间歇运动、照明、相机抖动和杂波。为了克服上述问题,本文提出了一种结合奇异值分解(SVD)和鲁棒主成分分析(RPCA)进行奇异谱分析(SSA)的分解方法来进行有效的背景初始化。将RPCA结合到SVD中用于克服与非高斯噪声相关的问题,并且它还使用了视频输入的有效结构知识,即稀疏和低秩矩阵,从而提高了背景图像的峰值信噪比(PSNR)。使用SBI数据集分析SSA-SVDRPCA的性能。采用多尺度结构相似指数(MSSSIM)、平均灰度误差(AGE)、聚类误差像素百分比(pCEPS)、误差像素百分比(pEPs)和PSNR对SSA-SVDRPCA进行分析。利用背景初始化奇异谱分析(BISSA)和基于四元数的动态模态分解(Q-DMD)等现有方法与SSA-SVDRPCA方法进行比较。SSA-SVDRPCA的PSNR为30.39 dB,高于bisa和Q-DMD。关键词:背景初始化、分解、峰值信噪比、抗噪主成分分析、奇异谱分析、奇异值分解披露声明作者未报告潜在利益冲突。数据可用性声明在当前研究期间生成和/或分析的数据集在场景背景初始化(SBI)数据集中可用。作者简介:davishruth B. Gowda完成了他在AIEMS、班加罗尔、卡纳塔克邦和Mtech的论文。现为上海工学院电子工程系助理教授。他还在M T Gopalakrishna博士的指导下,在卡纳塔克邦Belagavi的VTU进行研究。他的研究领域属于计算机视觉和图像处理领域。t . GopalakrishnaM。T. Gopalakrishna获得印度Ramaiah理工学院计算机科学与工程学士学位,印度卡纳塔克邦Visvesvaraya理工大学技术硕士学位和印度卡纳塔克邦Visvesvaraya理工大学博士学位。他有超过22年的教学经验。他目前是印度班加罗尔SJB理工学院人工智能和机器学习系的教授兼系主任。在各类国际期刊、国际会议和国内会议上发表论文63余篇。主要研究方向为模式识别、数字图像处理与计算机视觉。MeghaJ。现为印度理工大学人工智能与机器学习系助理教授。研究重点是模式识别和图像处理。Shilpa Mohankumar是BIT印度理工学院的助理教授。主要研究方向为图像处理、计算机视觉和模式识别。
{"title":"Background initialization in video data using singular value decomposition and robust principal component analysis","authors":"Vishruth B. Gowda, M. T. Gopalakrishna, J. Megha, Shilpa Mohankumar","doi":"10.1080/1206212x.2023.2258329","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2258329","url":null,"abstract":"AbstractBackground initialization is used in video processing applications to extract a scene without the foreground scene. In recent times, the issue of background initialization has gained researchers’ attention in different fields such as video surveillance, video segmentation, computational photography, and so on. The initialization of the background is affected due to different complex dissimilarities such as shadow, intermittent movement, illumination, camera jitter, and clutter. To overcome the aforementioned issues, this paper proposes a decomposition using the combination of the Singular Value Decomposition (SVD) and Robust Principal Component Analysis (RPCA) for Singular Spectrum Analysis (SSA) to perform an effective background initialization. The incorporation of RPCA in SVD is used to overcome the issues related to non-Gaussian noise and it also uses an effective structural knowledge of the video input i.e. sparse and low rank matrix which improves the Peak-Signal-to-Noise-Ratio (PSNR) of the background image. The SBI dataset was used to analyze the performances of SSA-SVDRPCA. The SSA-SVDRPCA is analyzed using MultiScale Structural Similarity Index (MSSSIM), Average gray-level error (AGE), Percentage of clustered error pixels (pCEPS), Percentage of error pixels (pEPs), and PSNR. The existing approaches such as Background Initialization Singular Spectrum Analysis (BISSA) and Quaternion-based Dynamic Mode Decomposition (Q-DMD) are used to compare with the SSA-SVDRPCA method. The PSNR of the SSA-SVDRPCA for Board class is 30.39 dB which is higher than the BISSA and Q-DMD.KEYWORDS: Background initializationdecompositionpeak-signal-to-noise-ratiorobust principal component analysissingular spectrum analysissingular value decomposition Disclosure statementNo potential conflict of interest was reported by the author(s).Data availability statementThe datasets generated during and/or analyzed during the current study are available in the Scene Background Initialization (SBI) dataset.SBI datasethttps://sbmi2015.na.icar.cnr.it/SBIdataset.htmlAdditional informationNotes on contributorsVishruth B. GowdaVishruth B. Gowda completed his BE in AIEMS, bangalore, karnataka and Mtech from EWIT. He currently works as an assistant professor in Department of ISE,SJB Institute of technology. He is also pursuing his research in VTU, Belagavi, Karnataka under the supervision of Dr. M T Gopalakrishna. His research area falls under the domain of comuter vision and image processing.M. T. GopalakrishnaM. T. Gopalakrishna received B. E degree (Computer Science & Engineering) from M. S Ramaiah Institute of Technology, India, M. Tech degree from Visvesvaraya Technological University, Karnataka, India and PhD from Visvesvaraya Technological University, Karnataka, India. He has more than 22 years of teaching experience. He is currently Professor & Head, Department of Artificial Intelligence and Machine Learning in SJB Institute of Technology, Bangalore, India. He has ","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135061128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spam email detection using a novel multilayer classification-based decision technique 基于多层分类决策技术的垃圾邮件检测
Q2 Computer Science Pub Date : 2023-09-19 DOI: 10.1080/1206212x.2023.2258328
Subhajit Das, Sourav Mandal, Rohini Basak
AbstractBecause of the rapid advancement of technology over the last several years, the number of internet users is growing at an exponential rate, and as a result, email communication has become popular as a means of exchanging information over the internet. Sending data and communicating with peers via email is the most cost-effective method. These email services also cause problems for users by sending electronic junk mail, often known as spam mail. Spam email is a privacy concern that is linked to a slew of commercial and dangerous websites, causing phishing, virus distribution, and a slew of other problems. This study examines several aspects that have been used for email spam classification, as well as offering an overview of a handful of classifiers or algorithms that have been successfully evaluated, as well as exploratory data analysis. The proposed email spam classifier uses three parallel layers of machine learning and deep learning techniques, followed by a decision function to determine whether or not the emails are spam. During testing, it was found that the proposed classifier beats similar systems on the standard dataset with an accuracy of 98.4%.KEYWORDS: Content-based spam classificationemail spam classificationtext classificationmachine learningdeep learning Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 https://github.com/tensorflow/estimator2 https://nlp.stanford.edu/projects/glove/3 http://nlp.cs.aueb.gr/software_and_datasets/Enron-Spam/index.html4 https://www.tensorflow.org/Additional informationNotes on contributorsSubhajit DasSubhajit Das is an Information Technology Engineer with more than 11 years of experience in software Development. He has completed Master of Engineering from Jadavpur University, Kolakta, India on Software Engineering and received a bachelor's degree in Computer Science and Engineering from West Bengal University of Technology, India. He presently holds the position of Senior Software Engineer at Cognizant Technology Solutions. He is also interested in building the architecture of contemporary systems using cloud and GenAI solutions, addressing difficult problems, migrating technologies, and optimizing algorithms.Sourav MandalSourav Mandal has been an Assistant Professor at XIM University's School of Computer Science and Engineering (SCSE), in Bhubaneswar, Odisha, India since October 2020. Prior to that, he had been employed since 2006 as an Assistant Professor in the Department of Computer Science and Engineering at the Haldia Institute of Technology in Haldia, India. Among his research interests in the natural language processing (NLP) and artificial intelligence (AI) field are natural language understanding, information extraction, text classification, text summarization, etc. with data science, machine learning, and deep learning. Sourav Mandal earned a bachelor's degree in Computer Science & Engineering from The University of Burdwan in Burdwan, India,
摘要由于近年来科技的飞速发展,互联网用户的数量呈指数级增长,因此,电子邮件通信作为一种在互联网上交换信息的手段已经变得流行起来。通过电子邮件发送数据和与同行通信是最经济有效的方法。这些电子邮件服务还通过发送电子垃圾邮件(通常被称为垃圾邮件)给用户带来问题。垃圾邮件是一种隐私问题,它与大量商业和危险网站有关,导致网络钓鱼、病毒传播和一系列其他问题。本研究考察了用于垃圾邮件分类的几个方面,并概述了一些已成功评估的分类器或算法,以及探索性数据分析。提出的垃圾邮件分类器使用机器学习和深度学习技术的三个并行层,然后是一个决策函数来确定电子邮件是否为垃圾邮件。在测试过程中,发现所提出的分类器以98.4%的准确率击败了标准数据集上的类似系统。关键词:基于内容的垃圾邮件分类电子邮件垃圾邮件分类文本分类机器学习深度学习披露声明作者未报告潜在的利益冲突。注1 https://github.com/tensorflow/estimator2 https://nlp.stanford.edu/projects/glove/3 http://nlp.cs.aueb.gr/software_and_datasets/Enron-Spam/index.html4 https://www.tensorflow.org/Additional信息贡献者说明subhajit DasSubhajit Das是一名信息技术工程师,在软件开发方面拥有超过11年的经验。他获得了印度Kolakta Jadavpur大学软件工程硕士学位,并获得了印度西孟加拉邦科技大学计算机科学与工程学士学位。他目前担任Cognizant Technology Solutions的高级软件工程师。他还对使用云和GenAI解决方案构建当代系统架构、解决难题、迁移技术和优化算法感兴趣。Sourav Mandal自2020年10月起担任印度奥里萨邦布巴内斯瓦尔的XIM大学计算机科学与工程学院(SCSE)的助理教授。在此之前,他自2006年以来一直担任位于印度Haldia的Haldia Institute of Technology的计算机科学与工程系助理教授。他在自然语言处理(NLP)和人工智能(AI)领域的研究兴趣包括自然语言理解、信息提取、文本分类、文本摘要等与数据科学、机器学习和深度学习的结合。Sourav Mandal于2003年在印度布尔德万大学获得计算机科学与工程学士学位,2005年在印度加尔各答贾达夫普尔大学获得多媒体开发硕士学位,并于2020年在印度加尔各答贾达夫普尔大学获得工程学博士学位。Rohini BasakRohini Basak自2018年起担任印度贾达夫普尔大学信息技术系助理教授。她于2020年在同一所大学获得计算机科学与工程博士学位。她的研究兴趣包括自然语言处理、计算语言学、情感分析、深度学习等。至今已指导硕士生10名。主要讲授面向对象编程(c++)、面向对象系统(Java)、数据结构与算法、计算机组织与网络等。
{"title":"Spam email detection using a novel multilayer classification-based decision technique","authors":"Subhajit Das, Sourav Mandal, Rohini Basak","doi":"10.1080/1206212x.2023.2258328","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2258328","url":null,"abstract":"AbstractBecause of the rapid advancement of technology over the last several years, the number of internet users is growing at an exponential rate, and as a result, email communication has become popular as a means of exchanging information over the internet. Sending data and communicating with peers via email is the most cost-effective method. These email services also cause problems for users by sending electronic junk mail, often known as spam mail. Spam email is a privacy concern that is linked to a slew of commercial and dangerous websites, causing phishing, virus distribution, and a slew of other problems. This study examines several aspects that have been used for email spam classification, as well as offering an overview of a handful of classifiers or algorithms that have been successfully evaluated, as well as exploratory data analysis. The proposed email spam classifier uses three parallel layers of machine learning and deep learning techniques, followed by a decision function to determine whether or not the emails are spam. During testing, it was found that the proposed classifier beats similar systems on the standard dataset with an accuracy of 98.4%.KEYWORDS: Content-based spam classificationemail spam classificationtext classificationmachine learningdeep learning Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 https://github.com/tensorflow/estimator2 https://nlp.stanford.edu/projects/glove/3 http://nlp.cs.aueb.gr/software_and_datasets/Enron-Spam/index.html4 https://www.tensorflow.org/Additional informationNotes on contributorsSubhajit DasSubhajit Das is an Information Technology Engineer with more than 11 years of experience in software Development. He has completed Master of Engineering from Jadavpur University, Kolakta, India on Software Engineering and received a bachelor's degree in Computer Science and Engineering from West Bengal University of Technology, India. He presently holds the position of Senior Software Engineer at Cognizant Technology Solutions. He is also interested in building the architecture of contemporary systems using cloud and GenAI solutions, addressing difficult problems, migrating technologies, and optimizing algorithms.Sourav MandalSourav Mandal has been an Assistant Professor at XIM University's School of Computer Science and Engineering (SCSE), in Bhubaneswar, Odisha, India since October 2020. Prior to that, he had been employed since 2006 as an Assistant Professor in the Department of Computer Science and Engineering at the Haldia Institute of Technology in Haldia, India. Among his research interests in the natural language processing (NLP) and artificial intelligence (AI) field are natural language understanding, information extraction, text classification, text summarization, etc. with data science, machine learning, and deep learning. Sourav Mandal earned a bachelor's degree in Computer Science & Engineering from The University of Burdwan in Burdwan, India,","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135060551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberbullying in text content detection: an analytical review 文本内容检测中的网络欺凌:分析综述
Q2 Computer Science Pub Date : 2023-09-14 DOI: 10.1080/1206212x.2023.2256048
Sylvia W. Azumah, Nelly Elsayed, Zag ElSayed, Murat Ozer
AbstractTechnological advancements have resulted in an exponential increase in the use of online social networks (OSNs) worldwide. While online social networks provide a great communication medium, they also increase the user's exposure to life-threatening situations such as suicide, eating disorder, cybercrime, compulsive behavior, anxiety, and depression. To tackle the issue of cyberbullying, most existing literature focuses on developing approaches to identifying factors and understanding the textual factors associated with cyberbullying. While most of these approaches have brought great success in cyberbullying research, data availability needed to develop model detection remains a challenge in the research space. This paper conducts a comprehensive literature review to provide an understanding of cyberbullying detection.Keywords: Cyberbullyingcybercrimetext detectiondeep learningsocial media Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsSylvia W. AzumahSylvia W. Azumah is a Ghanaian PhD candidate in Information Technology, specializing in cybersecurity at the University of Cincinnati. She holds a master's in IT from the same university, where she was recognized as the most outstanding student and a bachelors in IT at Bluecrest University from Ghana, West Africa An avid coder, mentor to women in cybersecurity.Nelly ElsayedDr. Nelly Elsayed is an Assistant Professor at the School of Information Technology. She is the Leader and Founder of the Applied Machine Learning and Intelligence Lab. She received a BS. and MS. degree in Computer Science from Alexandria University, and she received her MS. Eng. and Ph.D. degrees from the University of Louisiana at Lafayette. She is an IEEE Computational Intelligence Society active member. She has served as a principal investigator and co-principle investigator in different federal, educational, and industrial level-funded research projects. She received the Faculty Incentive Award for Research and Scholarship from the CECH, UC, recognizing her research contributions, journal and conference peer-reviewed publications, and professional presentations in 2020-2021. She received the Love of Learning Award from the Honor Society Phi Kappa Phi in 2019, 2021 and 2023. She received the Golden Apple Award for Excellence in Teaching (Graduate Level), CECH. She received the UCAADA Sarah Grant Barber Outstanding Advising Faculty Award for the academic year 2021-2022 University of Cincinnati. She has been an Ambassador for Goodwill of Lafayette, Louisiana, since 2017.Zag ElSayedDr Zag ElSayed was born in Odessa, USSR; he is a computer engineering scientist specializing in the Brain Machine Interface, Artificial Intelligence, Cybersecurity for Cyber-Physical Systems and I2oT as well as VLSI Digital Design. He received his B.S. and M.S. with Distinction degree of Honor from Alexandria University in 2005 where he introduced the early framework
摘要技术进步导致全球在线社交网络(OSNs)的使用呈指数级增长。虽然在线社交网络提供了一个很好的交流媒介,但它们也增加了用户面临威胁生命的情况的风险,比如自杀、饮食失调、网络犯罪、强迫行为、焦虑和抑郁。为了解决网络欺凌问题,大多数现有文献侧重于开发识别因素和理解与网络欺凌相关的文本因素的方法。虽然这些方法中的大多数在网络欺凌研究中取得了巨大成功,但开发模型检测所需的数据可用性仍然是研究领域的一个挑战。本文进行了全面的文献综述,以提供对网络欺凌检测的理解。关键词:网络欺凌网络犯罪文本检测深度学习社交媒体披露声明作者未报告潜在利益冲突。西尔维娅·w·阿祖玛西尔维娅·w·阿祖玛是一位加纳籍的信息技术博士研究生,在辛辛那提大学专攻网络安全。她拥有同一所大学的IT硕士学位,在那里她被认为是最优秀的学生,并在西非加纳的Bluecrest大学获得IT学士学位。她是一名狂热的程序员,也是网络安全领域女性的导师。耐莉ElsayedDr。Nelly Elsayed是信息技术学院的助理教授。她是应用机器学习和智能实验室的负责人和创始人。她获得了学士学位。在亚历山大大学获得计算机科学硕士学位,并获得工程学硕士学位。以及路易斯安那大学拉斐特分校的博士学位。她是IEEE计算智能协会的活跃成员。她曾在不同的联邦、教育和工业水平资助的研究项目中担任首席研究员和联合首席研究员。她在2020-2021年获得了加州大学CECH颁发的教师研究激励奖和奖学金,以表彰她的研究贡献、期刊和会议同行评审出版物以及专业演讲。她在2019年,2021年和2023年获得了荣誉协会Phi Kappa Phi颁发的学习之爱奖。曾获欧洲高等教育学院研究生教学金苹果奖。她获得了辛辛那提大学2021-2022学年UCAADA莎拉·格兰特·巴伯杰出指导教师奖。自2017年以来,她一直担任路易斯安那州拉斐特亲善大使。Zag ElSayed博士出生于苏联敖德萨;他是一名计算机工程科学家,专门从事脑机接口,人工智能,网络物理系统和物联网的网络安全以及VLSI数字设计。2005年,他以优异的荣誉学位获得亚历山大大学的学士学位和硕士学位,在此期间,他介绍了工业物联网(IoT)实施的早期框架架构。他于2016年获得路易斯安那大学拉斐特分校计算机工程第二个硕士学位和博士学位;他曾在埃及、俄罗斯、乌克兰和美国担任研究工程师。自2014年以来,他一直在领先的石油和天然气公司工作,专注于工业物联网的开发和实施。他精通九种语言,是全国公认的画家,也是注册的红十字会志愿者。Zag认为理解宇宙的关键就在人脑中。这篇演讲是在TEDx活动上发表的,使用的是TED会议格式:https://www.ted.com/tedx.Murat OzerMurat Ozer博士是辛辛那提大学信息技术学院的助理教授。该校教育、刑事司法和人类服务学院的一部分。他领导了矫正聊天机器人的开发,该机器人将使用精心策划的信息为刑事司法系统提供新的资源。
{"title":"Cyberbullying in text content detection: an analytical review","authors":"Sylvia W. Azumah, Nelly Elsayed, Zag ElSayed, Murat Ozer","doi":"10.1080/1206212x.2023.2256048","DOIUrl":"https://doi.org/10.1080/1206212x.2023.2256048","url":null,"abstract":"AbstractTechnological advancements have resulted in an exponential increase in the use of online social networks (OSNs) worldwide. While online social networks provide a great communication medium, they also increase the user's exposure to life-threatening situations such as suicide, eating disorder, cybercrime, compulsive behavior, anxiety, and depression. To tackle the issue of cyberbullying, most existing literature focuses on developing approaches to identifying factors and understanding the textual factors associated with cyberbullying. While most of these approaches have brought great success in cyberbullying research, data availability needed to develop model detection remains a challenge in the research space. This paper conducts a comprehensive literature review to provide an understanding of cyberbullying detection.Keywords: Cyberbullyingcybercrimetext detectiondeep learningsocial media Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributorsSylvia W. AzumahSylvia W. Azumah is a Ghanaian PhD candidate in Information Technology, specializing in cybersecurity at the University of Cincinnati. She holds a master's in IT from the same university, where she was recognized as the most outstanding student and a bachelors in IT at Bluecrest University from Ghana, West Africa An avid coder, mentor to women in cybersecurity.Nelly ElsayedDr. Nelly Elsayed is an Assistant Professor at the School of Information Technology. She is the Leader and Founder of the Applied Machine Learning and Intelligence Lab. She received a BS. and MS. degree in Computer Science from Alexandria University, and she received her MS. Eng. and Ph.D. degrees from the University of Louisiana at Lafayette. She is an IEEE Computational Intelligence Society active member. She has served as a principal investigator and co-principle investigator in different federal, educational, and industrial level-funded research projects. She received the Faculty Incentive Award for Research and Scholarship from the CECH, UC, recognizing her research contributions, journal and conference peer-reviewed publications, and professional presentations in 2020-2021. She received the Love of Learning Award from the Honor Society Phi Kappa Phi in 2019, 2021 and 2023. She received the Golden Apple Award for Excellence in Teaching (Graduate Level), CECH. She received the UCAADA Sarah Grant Barber Outstanding Advising Faculty Award for the academic year 2021-2022 University of Cincinnati. She has been an Ambassador for Goodwill of Lafayette, Louisiana, since 2017.Zag ElSayedDr Zag ElSayed was born in Odessa, USSR; he is a computer engineering scientist specializing in the Brain Machine Interface, Artificial Intelligence, Cybersecurity for Cyber-Physical Systems and I2oT as well as VLSI Digital Design. He received his B.S. and M.S. with Distinction degree of Honor from Alexandria University in 2005 where he introduced the early framework","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135487152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Computers and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1