首页 > 最新文献

Int. J. Comput. Intell. Appl.最新文献

英文 中文
CT Images Segmentation Using a Deep Learning-Based Approach for Preoperative Projection of Human Organ Model Using Augmented Reality Technology 基于深度学习的CT图像分割方法用于增强现实技术人体器官模型的术前投影
Pub Date : 2023-06-05 DOI: 10.1142/s1469026823500062
Nessrine Elloumi, Aicha Ben Makhlouf, Ayman Afli, B. Louhichi, M. Jaidane, J. M. R. Tavares
Over the last decades, facing the blooming growth of technological progress, interest in digital devices such as computed tomography (CT) as well as magnetic resource imaging which emerged in the 1970s has continued to grow. Such medical data can be invested in numerous visual recognition applications. In this context, these data may be segmented to generate a precise 3D representation of an organ that may be visualized and manipulated to aid surgeons during surgical interventions. Notably, the segmentation process is performed manually through the use of image processing software. Within this framework, multiple outstanding approaches were elaborated. However, the latter proved to be inefficient and required human intervention to opt for the segmentation area appropriately. Over the last few years, automatic methods which are based on deep learning approaches have outperformed the state-of-the-art segmentation approaches due to the use of the relying on Convolutional Neural Networks. In this paper, a segmentation of preoperative patients CT scans based on deep learning architecture was carried out to determine the target organ’s shape. As a result, the segmented 2D CT images are used to generate the patient-specific biomechanical 3D model. To assess the efficiency and reliability of the proposed approach, the 3DIRCADb dataset was invested. The segmentation results were obtained through the implementation of a U-net architecture with good accuracy.
在过去的几十年里,面对技术进步的蓬勃发展,人们对数字设备的兴趣持续增长,如计算机断层扫描(CT)和20世纪70年代出现的磁资源成像。这些医疗数据可以投资于许多视觉识别应用程序。在这种情况下,这些数据可以被分割以生成器官的精确3D表示,可以可视化和操作,以帮助外科医生进行手术干预。值得注意的是,分割过程是通过使用图像处理软件手动执行的。在这个框架内,阐述了多种突出的方法。然而,后者被证明是低效的,需要人为干预来选择适当的分割区域。在过去的几年里,基于深度学习方法的自动分割方法由于使用了依赖于卷积神经网络的方法,已经优于最先进的分割方法。本文基于深度学习架构对术前患者CT扫描图像进行分割,确定目标器官的形状。因此,分割的2D CT图像用于生成患者特异性的生物力学3D模型。为了评估该方法的效率和可靠性,我们使用了3DIRCADb数据集。通过实现U-net结构,获得了精度较高的分割结果。
{"title":"CT Images Segmentation Using a Deep Learning-Based Approach for Preoperative Projection of Human Organ Model Using Augmented Reality Technology","authors":"Nessrine Elloumi, Aicha Ben Makhlouf, Ayman Afli, B. Louhichi, M. Jaidane, J. M. R. Tavares","doi":"10.1142/s1469026823500062","DOIUrl":"https://doi.org/10.1142/s1469026823500062","url":null,"abstract":"Over the last decades, facing the blooming growth of technological progress, interest in digital devices such as computed tomography (CT) as well as magnetic resource imaging which emerged in the 1970s has continued to grow. Such medical data can be invested in numerous visual recognition applications. In this context, these data may be segmented to generate a precise 3D representation of an organ that may be visualized and manipulated to aid surgeons during surgical interventions. Notably, the segmentation process is performed manually through the use of image processing software. Within this framework, multiple outstanding approaches were elaborated. However, the latter proved to be inefficient and required human intervention to opt for the segmentation area appropriately. Over the last few years, automatic methods which are based on deep learning approaches have outperformed the state-of-the-art segmentation approaches due to the use of the relying on Convolutional Neural Networks. In this paper, a segmentation of preoperative patients CT scans based on deep learning architecture was carried out to determine the target organ’s shape. As a result, the segmented 2D CT images are used to generate the patient-specific biomechanical 3D model. To assess the efficiency and reliability of the proposed approach, the 3DIRCADb dataset was invested. The segmentation results were obtained through the implementation of a U-net architecture with good accuracy.","PeriodicalId":422521,"journal":{"name":"Int. J. Comput. Intell. Appl.","volume":"34 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Styling Classification of Group Photos Fusing Head and Pose Features 融合头部和姿态特征的群像造型分类
Pub Date : 2023-05-04 DOI: 10.1142/s1469026823500104
Kai Wang, Congwei Guo, Zhuang Zhao, Yongzhen Ke, Shuai Yang
Group photo images are everywhere and vary greatly by the shooting scene. Compared with common images, the Image Aesthetic Quality Assessment (IAQI) of group photo pays more attention to the relevant characteristics of the main population. Still, the existing methods do not make further special research on group photos. Therefore, we propose a new concept of group photo styling based on analyzing group photos and photographic theory. Besides that, by comparing and analyzing many group photos, we classify the group photos into five categories. In this paper, the main factors of the head and pose are considered simultaneously, and the method of Group Photo Styling Classification (GPSC) can classify different group photos automatically. To verify the effectiveness of our method, we collected a Group Photo Styling Dataset (GPSD). The dataset contains 998 group photo images, and each image’s group photo styling category is marked. The experimental results on GPSD show that the fusion of head features and pose features can classify different group photos well. The accuracy of GPSC reaches 93.9%, much higher than the previous classification model.
集体照随处可见,不同的拍摄场景差别很大。与普通图像相比,集体照的图像审美质量评价(IAQI)更关注主体人群的相关特征。然而,现有的方法并没有对集体照片进行进一步的专门研究。因此,我们在分析集体照和摄影理论的基础上,提出了集体照造型的新概念。此外,通过对大量的集体照进行对比分析,我们将集体照分为五类。本文同时考虑了头部和姿态的主要影响因素,提出了一种基于GPSC的集体照样式分类方法,可以对不同的集体照进行自动分类。为了验证我们方法的有效性,我们收集了一个团体照片样式数据集(GPSD)。该数据集包含998张集体照图像,并标记了每个图像的集体照样式类别。GPSD的实验结果表明,融合头部特征和姿态特征可以很好地分类不同的群体照片。GPSC的准确率达到93.9%,大大高于以往的分类模型。
{"title":"Styling Classification of Group Photos Fusing Head and Pose Features","authors":"Kai Wang, Congwei Guo, Zhuang Zhao, Yongzhen Ke, Shuai Yang","doi":"10.1142/s1469026823500104","DOIUrl":"https://doi.org/10.1142/s1469026823500104","url":null,"abstract":"Group photo images are everywhere and vary greatly by the shooting scene. Compared with common images, the Image Aesthetic Quality Assessment (IAQI) of group photo pays more attention to the relevant characteristics of the main population. Still, the existing methods do not make further special research on group photos. Therefore, we propose a new concept of group photo styling based on analyzing group photos and photographic theory. Besides that, by comparing and analyzing many group photos, we classify the group photos into five categories. In this paper, the main factors of the head and pose are considered simultaneously, and the method of Group Photo Styling Classification (GPSC) can classify different group photos automatically. To verify the effectiveness of our method, we collected a Group Photo Styling Dataset (GPSD). The dataset contains 998 group photo images, and each image’s group photo styling category is marked. The experimental results on GPSD show that the fusion of head features and pose features can classify different group photos well. The accuracy of GPSC reaches 93.9%, much higher than the previous classification model.","PeriodicalId":422521,"journal":{"name":"Int. J. Comput. Intell. Appl.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117075261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Genetic Algorithm-Based Optimal Resource Trust Line Prediction in Cloud Computing 云计算中基于遗传算法的最优资源信任线预测
Pub Date : 2023-04-25 DOI: 10.1142/s146902682341002x
S. Mercy, M. Jaiganesh, R. Nagaraja, G. Sudha
A cloud computing signifies a novel computing paradigm that endorses reactive delivery of resources and services. A distinctive cloud service of such data center deploys over many computing nodes requesting services from the data centers. The organization of resources and trustworthiness of client is a hot topic of research in cloud computing. One of the major threats in cloud computing is unauthorized access of hardware and their resources. To conquer the issue, this novel work proposes an Optimal Resource Trust line prediction using Genetic Algorithm (GAORTL). The main aim of the work is to find the allocated optimal resource utilization of clients through an evolutionary algorithm. Implementation is evaluated to prove the benefit of the algorithm. Subsequently, we perform a comprehensive investigation that the proposed GAORTL delivers a better prediction of trustworthiness in variety of client sizes for a big scale batch of occurrences.
云计算意味着一种新的计算范式,它支持响应式地交付资源和服务。这种数据中心的独特云服务部署在许多从数据中心请求服务的计算节点上。资源的组织和客户端的可信赖性是云计算领域的研究热点。云计算的主要威胁之一是对硬件及其资源的未经授权访问。为了解决这个问题,本文提出了一种使用遗传算法(GAORTL)的最优资源信任线预测方法。该工作的主要目的是通过进化算法找到分配给客户端的最优资源利用率。最后对算法的实现进行了评价,证明了算法的有效性。随后,我们进行了一项全面的调查,表明所提出的GAORTL在各种客户规模的大规模事件中提供了更好的可信度预测。
{"title":"Genetic Algorithm-Based Optimal Resource Trust Line Prediction in Cloud Computing","authors":"S. Mercy, M. Jaiganesh, R. Nagaraja, G. Sudha","doi":"10.1142/s146902682341002x","DOIUrl":"https://doi.org/10.1142/s146902682341002x","url":null,"abstract":"A cloud computing signifies a novel computing paradigm that endorses reactive delivery of resources and services. A distinctive cloud service of such data center deploys over many computing nodes requesting services from the data centers. The organization of resources and trustworthiness of client is a hot topic of research in cloud computing. One of the major threats in cloud computing is unauthorized access of hardware and their resources. To conquer the issue, this novel work proposes an Optimal Resource Trust line prediction using Genetic Algorithm (GAORTL). The main aim of the work is to find the allocated optimal resource utilization of clients through an evolutionary algorithm. Implementation is evaluated to prove the benefit of the algorithm. Subsequently, we perform a comprehensive investigation that the proposed GAORTL delivers a better prediction of trustworthiness in variety of client sizes for a big scale batch of occurrences.","PeriodicalId":422521,"journal":{"name":"Int. J. Comput. Intell. Appl.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121935639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shearlet Transform-Based Novel Method for Multimodality Medical Image Fusion Using Deep Learning 基于Shearlet变换的深度学习医学图像融合新方法
Pub Date : 2023-04-06 DOI: 10.1142/s1469026823410067
A. Mergin, Godwin Premi Maria Sebastin
Multi-modality medical image fusion (MMIF) methods were widely used in a variety of clinical settings. For specialists, MMIF could provide an image containing anatomical and physiological information that can help develop diagnostic procedures. Different models linked to MMIF were proposed previously. However, there would be a need to enhance the functionality of prior methodologies. In this proposed model, a unique fusion model depending upon optimal thresholding and deep learning approaches are presented. An enhanced monarch butterfly optimization (EMBO) determines an optimal threshold with fusion rules as in shearlet transform. The efficiency of the fusion process mainly depends on the fusion rule and the optimization of the fusion rule can improve the efficiency of the fusion. The extraction element of the deep learning approach was then utilized to fuse high- and low-frequency sub-bands. The fusion technique was carried out using a convolutional neural network (CNN). The studies were carried out for MRI and CT images. The fusion results were attained and the proposed model was proved to offer effective performance with reduced values of error and improved values of correlation.
多模态医学图像融合(MMIF)方法广泛应用于各种临床环境。对于专家来说,MMIF可以提供包含解剖和生理信息的图像,有助于制定诊断程序。先前提出了与MMIF相关的不同模型。但是,需要增强先前方法的功能。在该模型中,提出了一种基于最优阈值和深度学习方法的独特融合模型。一种增强的君主蝶优化算法(EMBO)利用shearlet变换中的融合规则确定最优阈值。核聚变过程的效率主要取决于核聚变规则,对核聚变规则的优化可以提高核聚变的效率。然后利用深度学习方法的提取元素融合高、低频子带。融合技术使用卷积神经网络(CNN)进行。研究采用MRI和CT图像。结果表明,该模型具有较低的误差值和较高的相关度,具有较好的融合性能。
{"title":"Shearlet Transform-Based Novel Method for Multimodality Medical Image Fusion Using Deep Learning","authors":"A. Mergin, Godwin Premi Maria Sebastin","doi":"10.1142/s1469026823410067","DOIUrl":"https://doi.org/10.1142/s1469026823410067","url":null,"abstract":"Multi-modality medical image fusion (MMIF) methods were widely used in a variety of clinical settings. For specialists, MMIF could provide an image containing anatomical and physiological information that can help develop diagnostic procedures. Different models linked to MMIF were proposed previously. However, there would be a need to enhance the functionality of prior methodologies. In this proposed model, a unique fusion model depending upon optimal thresholding and deep learning approaches are presented. An enhanced monarch butterfly optimization (EMBO) determines an optimal threshold with fusion rules as in shearlet transform. The efficiency of the fusion process mainly depends on the fusion rule and the optimization of the fusion rule can improve the efficiency of the fusion. The extraction element of the deep learning approach was then utilized to fuse high- and low-frequency sub-bands. The fusion technique was carried out using a convolutional neural network (CNN). The studies were carried out for MRI and CT images. The fusion results were attained and the proposed model was proved to offer effective performance with reduced values of error and improved values of correlation.","PeriodicalId":422521,"journal":{"name":"Int. J. Comput. Intell. Appl.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114984658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Energy-Efficient Clustering and Fuzzy-Based Path Selection for Flying Ad-Hoc Networks 飞行Ad-Hoc网络的节能聚类和模糊路径选择
Pub Date : 2023-04-06 DOI: 10.1142/s1469026823410031
S. S. Priya, M. Mohanraj
Flying Ad-hoc Networks (FANET) allow for an ad-hoc networking among Unmanned Aerial Vehicles (UAV), have recently gained popularity in a variety of military and non-militant applications. The existing work used the Glowworm Swarm Optimization (GSO) algorithm to create a self-organization depending on clustering technique for FANET. Owing to UAV increased mobility, network topology might vary over time, providing route discovery and maintenance is one of the most difficult tasks. And also, the network throughput is still more worsened by the network congestion. To solve this problem, the proposed work designed an energy efficient clustering and fuzzy-based path selection for FANET. In this work, initially, the clustering is performed using the UAV distance. For efficient communication and energy consumption, optimal selection of Cluster Head (CH) is performed by using Adaptive Mutation with Teaching-Learning-Based Optimization (AMTLBO) algorithm. To improve the optimal selection of CH nodes, the best fitness values are calculated. The fitness function depends on Link capacity, remaining energy and neighbor UAV distance. Next to that, nodes begin communications as well as transmit their information to their CH. Improved Fuzzy-based Routing (IFR) is introduced for improving the route discovery process. The goal is to find routes that have a high level of flying autonomy, minimal mobility, and a higher Received Signal Strength Indicator (RSSI). As a result, the energy usage of network is decreased, as well as the cluster’s lifespan is extended. Finally, an adaptive and reliable congestion detection mechanism is introduced to transmit the packets with congestion free path. The experimental result shows that the proposed AMTLBO system attains higher performance compared to the existing system in terms of energy usage, throughput, delay, overhead and packet delivery ratio.
飞行自组织网络(FANET)允许无人机(UAV)之间的自组织网络,最近在各种军事和非军事应用中得到了普及。现有的工作是使用GSO算法来创建基于聚类技术的自组织FANET。由于无人机增加机动性,网络拓扑可能随时间变化,提供路由发现和维护是最困难的任务之一。此外,网络拥塞还会进一步恶化网络吞吐量。为了解决这一问题,本文设计了一种节能的聚类和基于模糊的FANET路径选择方法。在这项工作中,首先使用无人机距离进行聚类。为了保证通信效率和能量消耗,采用基于教学的自适应突变优化算法(AMTLBO)对簇头进行最优选择。为了提高CH节点的最优选择,计算了最佳适应度值。适应度函数取决于链路容量、剩余能量和邻近无人机距离。然后,节点开始通信,并将信息发送到各自的CH。为了改进路由发现过程,引入了改进的基于模糊的路由(IFR)。目标是找到具有高度飞行自主性、最小机动性和更高接收信号强度指标(RSSI)的路线。从而降低了网络的能耗,延长了集群的生命周期。最后,提出了一种自适应的、可靠的拥塞检测机制,使数据包在无拥塞路径上传输。实验结果表明,与现有系统相比,所提出的AMTLBO系统在能量使用、吞吐量、延迟、开销和分组发送率等方面都具有更高的性能。
{"title":"An Energy-Efficient Clustering and Fuzzy-Based Path Selection for Flying Ad-Hoc Networks","authors":"S. S. Priya, M. Mohanraj","doi":"10.1142/s1469026823410031","DOIUrl":"https://doi.org/10.1142/s1469026823410031","url":null,"abstract":"Flying Ad-hoc Networks (FANET) allow for an ad-hoc networking among Unmanned Aerial Vehicles (UAV), have recently gained popularity in a variety of military and non-militant applications. The existing work used the Glowworm Swarm Optimization (GSO) algorithm to create a self-organization depending on clustering technique for FANET. Owing to UAV increased mobility, network topology might vary over time, providing route discovery and maintenance is one of the most difficult tasks. And also, the network throughput is still more worsened by the network congestion. To solve this problem, the proposed work designed an energy efficient clustering and fuzzy-based path selection for FANET. In this work, initially, the clustering is performed using the UAV distance. For efficient communication and energy consumption, optimal selection of Cluster Head (CH) is performed by using Adaptive Mutation with Teaching-Learning-Based Optimization (AMTLBO) algorithm. To improve the optimal selection of CH nodes, the best fitness values are calculated. The fitness function depends on Link capacity, remaining energy and neighbor UAV distance. Next to that, nodes begin communications as well as transmit their information to their CH. Improved Fuzzy-based Routing (IFR) is introduced for improving the route discovery process. The goal is to find routes that have a high level of flying autonomy, minimal mobility, and a higher Received Signal Strength Indicator (RSSI). As a result, the energy usage of network is decreased, as well as the cluster’s lifespan is extended. Finally, an adaptive and reliable congestion detection mechanism is introduced to transmit the packets with congestion free path. The experimental result shows that the proposed AMTLBO system attains higher performance compared to the existing system in terms of energy usage, throughput, delay, overhead and packet delivery ratio.","PeriodicalId":422521,"journal":{"name":"Int. J. Comput. Intell. Appl.","volume":"17 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127004689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An IoT-Fuzzy-Based Jamming Detection and Recovery System in Wireless Video Surveillance System 基于物联网模糊的无线视频监控系统干扰检测与恢复系统
Pub Date : 2023-04-01 DOI: 10.1142/s1469026823500049
Mohammed A. Jasim, T. Atia
Wireless video surveillance system is one of the cyber-physical security systems kinds, which transmits the signal of IP cameras through a wireless medium using a radio band. WVSSs are widely deployed with large systems for use in strategic places such as city centers, public transportation, public roads, airports, and play a significant role in critical infrastructure protection. WVSSs are vulnerable to jamming attacks creating an unwanted denial of service. Hence, it is essential to secure this system from jamming attacks. In this paper, three models of IoT-fuzzy inference system-based jamming detection system are proposed for detecting and countermeasure the presence of jamming by computing two jamming detection metrics; PDR and PLR, and based on the result, the system countermeasures this attack by storing the video feed locally in the subsystem nodes. FIS models are based on Mamdani, Tsukamoto, and Sugeno fuzzy logic which optimizes the jamming detection metrics for detecting the jamming attack. The efficiency of these proposed models is compared in detecting jamming signals. The experimental results show that the proposed Tsukamoto model detects jamming attacks with high accuracy and efficiency. Finally, the proposed IoT-Tsukamoto-based model was compared with the existing systems and proved to be superior to them in terms of central processing complexity, accuracy, and countermeasure for this attack.
无线视频监控系统是网络物理安全系统的一种,它利用无线频段将网络摄像机的信号通过无线介质传输。wvss被广泛部署在大型系统中,用于城市中心、公共交通、公共道路、机场等战略场所,在关键基础设施保护中发挥重要作用。wvss容易受到干扰攻击,从而产生不必要的拒绝服务。因此,确保该系统免受干扰攻击至关重要。本文提出了三种基于物联网模糊推理系统的干扰检测系统模型,通过计算两个干扰检测指标来检测和对抗干扰的存在;基于PDR和PLR的结果,系统通过将视频馈送本地存储在子系统节点中来对抗这种攻击。FIS模型基于Mamdani、Tsukamoto和Sugeno模糊逻辑,优化了检测干扰攻击的干扰检测指标。比较了这些模型在检测干扰信号方面的效率。实验结果表明,所提出的冢本模型对干扰攻击具有较高的检测精度和效率。最后,将本文提出的基于iot - tsukamoto的模型与现有系统进行了比较,证明了该模型在中央处理复杂性、准确性和应对该攻击的对策方面都优于现有系统。
{"title":"An IoT-Fuzzy-Based Jamming Detection and Recovery System in Wireless Video Surveillance System","authors":"Mohammed A. Jasim, T. Atia","doi":"10.1142/s1469026823500049","DOIUrl":"https://doi.org/10.1142/s1469026823500049","url":null,"abstract":"Wireless video surveillance system is one of the cyber-physical security systems kinds, which transmits the signal of IP cameras through a wireless medium using a radio band. WVSSs are widely deployed with large systems for use in strategic places such as city centers, public transportation, public roads, airports, and play a significant role in critical infrastructure protection. WVSSs are vulnerable to jamming attacks creating an unwanted denial of service. Hence, it is essential to secure this system from jamming attacks. In this paper, three models of IoT-fuzzy inference system-based jamming detection system are proposed for detecting and countermeasure the presence of jamming by computing two jamming detection metrics; PDR and PLR, and based on the result, the system countermeasures this attack by storing the video feed locally in the subsystem nodes. FIS models are based on Mamdani, Tsukamoto, and Sugeno fuzzy logic which optimizes the jamming detection metrics for detecting the jamming attack. The efficiency of these proposed models is compared in detecting jamming signals. The experimental results show that the proposed Tsukamoto model detects jamming attacks with high accuracy and efficiency. Finally, the proposed IoT-Tsukamoto-based model was compared with the existing systems and proved to be superior to them in terms of central processing complexity, accuracy, and countermeasure for this attack.","PeriodicalId":422521,"journal":{"name":"Int. J. Comput. Intell. Appl.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116802286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating the Pertinence of Pose Estimation model for Sign Language Translation 手势翻译中姿态估计模型的针对性评价
Pub Date : 2023-04-01 DOI: 10.1142/s1469026823410092
K. Amrutha, P. Prabu
Sign Language is the natural language used by a community that is hearing impaired. It is necessary to convert this language to a commonly understandable form as it is used by a comparatively small part of society. The automatic Sign Language interpreters can convert the signs into text or audio by interpreting the hand movements and the corresponding facial expression. These two modalities work in tandem to give complete meaning to each word. In verbal communication, emotions can be conveyed by changing the tone and pitch of the voice, but in sign language, emotions are expressed using nonmanual movements that include body posture and facial muscle movements. Each such subtle moment should be considered as a feature and extracted using different models. This paper proposes three different models that can be used for varying levels of sign language. The first test was carried out using the Convex Hull-based Sign Language Recognition (SLR) finger spelling sign language, next using a Convolution Neural Network-based Sign Language Recognition (CNN-SLR) for fingerspelling sign language, and finally pose-based SLR for word-level sign language. The experiments show that the pose-based SLR model that captures features using landmark or key points has better SLR accuracy than Convex Hull and CNN-based SLR models.
手语是听力受损群体使用的自然语言。有必要把这种语言转换成一种通俗易懂的形式,因为它只被社会上相对较小的一部分人使用。自动手语翻译可以通过解读手势动作和相应的面部表情,将手势转换成文字或音频。这两种模式协同工作,赋予每个单词完整的含义。在语言交流中,情绪可以通过改变声音的音调和音高来传达,但在手语中,情绪是通过包括身体姿势和面部肌肉运动在内的非手动动作来表达的。每个这样微妙的时刻都应该被视为一个特征,并使用不同的模型进行提取。本文提出了三种不同的模型,可用于不同水平的手语。首先使用基于凸壳的手语识别(SLR)进行手指拼写手语测试,然后使用基于卷积神经网络的手语识别(CNN-SLR)进行手指拼写手语测试,最后使用基于姿势的SLR进行单词级手语测试。实验表明,利用地标或关键点捕获特征的基于姿态的单反模型比基于凸壳和cnn的单反模型具有更好的单反精度。
{"title":"Evaluating the Pertinence of Pose Estimation model for Sign Language Translation","authors":"K. Amrutha, P. Prabu","doi":"10.1142/s1469026823410092","DOIUrl":"https://doi.org/10.1142/s1469026823410092","url":null,"abstract":"Sign Language is the natural language used by a community that is hearing impaired. It is necessary to convert this language to a commonly understandable form as it is used by a comparatively small part of society. The automatic Sign Language interpreters can convert the signs into text or audio by interpreting the hand movements and the corresponding facial expression. These two modalities work in tandem to give complete meaning to each word. In verbal communication, emotions can be conveyed by changing the tone and pitch of the voice, but in sign language, emotions are expressed using nonmanual movements that include body posture and facial muscle movements. Each such subtle moment should be considered as a feature and extracted using different models. This paper proposes three different models that can be used for varying levels of sign language. The first test was carried out using the Convex Hull-based Sign Language Recognition (SLR) finger spelling sign language, next using a Convolution Neural Network-based Sign Language Recognition (CNN-SLR) for fingerspelling sign language, and finally pose-based SLR for word-level sign language. The experiments show that the pose-based SLR model that captures features using landmark or key points has better SLR accuracy than Convex Hull and CNN-based SLR models.","PeriodicalId":422521,"journal":{"name":"Int. J. Comput. Intell. Appl.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124524813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious Software Detection based on URL-API Intensity Feature Selection Using Deep Spectral Neural Classification for Improving Host Security 基于深度谱神经分类URL-API强度特征选择的恶意软件检测提高主机安全性
Pub Date : 2023-03-31 DOI: 10.1142/s1469026823500025
B. Lavanya, C. Shanthi
In recent years, the internet of services has been more responsive to access through the development of various application program interfaces (API). Accessing an HTTP uniform resource locator (URL) contains malicious software intended by the attacker to create security breaches through the use of APIs from various services on the internet. By default, the non-attentive URL downloads and installs malware in the background without the user’s knowledge. The host does not analyze the API-URL security certificate contract due to the feature access by the user. Therefore, the current Machine Learning (ML) techniques only check malware signatures and certificates rather than analyzing URL behaviour based on the impact of a URL accessed from the internet. To address this problem, we propose a novel intelligent malicious software based on URL-API intensity feature selection (IFS) and deep spectral neural classification (DSNC) for improving Host Security. Initially, the URL — successive certificate signing (SCS) of the user link accessibility is verified based on API download rate logs. This system identifies the best malware software. The Link Redirection Stability Rate (LRSR) is estimated based on the Redirection URL by accessing the direct link and redirect link. The domain transformation matrix (DTM) was created to create a pattern to access successive features. URL-API Intensity Feature Selection selects each estimated feature, and the selected features are based on soft-max logical activation with a recurrent neural network (RNN) optimized for deep learning. RNN is trained in the spectral domain for improving computation and efficiency. It predicts the class based on the risk of malicious weight to categorize class by reference. The proposed IFS-DSNC achieves accuracy of 95.6% than the other algorithms such as KNN, NB, CNN, LCS, GCRNC AGSCR. The experimental result shows that the proposed method provides better performance in finding malware software than the existing approaches, thereby improving the security against host breaching.
近年来,通过开发各种应用程序编程接口(API),服务的互联网对访问的响应更加灵敏。访问HTTP统一资源定位符(URL)包含攻击者意图通过使用来自internet上各种服务的api来创建安全漏洞的恶意软件。默认情况下,非注意URL在用户不知情的情况下在后台下载并安装恶意软件。由于用户访问特性,主机不分析API-URL安全证书契约。因此,目前的机器学习(ML)技术只检查恶意软件签名和证书,而不是基于从互联网访问的URL的影响来分析URL行为。为了解决这一问题,我们提出了一种基于URL-API强度特征选择(IFS)和深度谱神经分类(DSNC)的智能恶意软件来提高主机安全性。最初,用户链接可访问性的URL -连续证书签名(SCS)是基于API下载速率日志进行验证的。该系统识别出最好的恶意软件。LRSR (Link Redirection Stability Rate)是通过访问直连链路和重定向链路,根据重定向URL来估算的。创建了域转换矩阵(DTM)来创建访问连续特征的模式。URL-API强度特征选择选择每个估计的特征,所选择的特征基于软最大逻辑激活,使用针对深度学习优化的循环神经网络(RNN)。RNN在谱域进行训练,以提高计算能力和效率。它基于恶意权重的风险来预测类,通过引用对类进行分类。与KNN、NB、CNN、LCS、GCRNC、AGSCR等算法相比,本文提出的IFS-DSNC算法的准确率达到95.6%。实验结果表明,该方法比现有方法具有更好的检测恶意软件的性能,从而提高了对主机入侵的安全性。
{"title":"Malicious Software Detection based on URL-API Intensity Feature Selection Using Deep Spectral Neural Classification for Improving Host Security","authors":"B. Lavanya, C. Shanthi","doi":"10.1142/s1469026823500025","DOIUrl":"https://doi.org/10.1142/s1469026823500025","url":null,"abstract":"In recent years, the internet of services has been more responsive to access through the development of various application program interfaces (API). Accessing an HTTP uniform resource locator (URL) contains malicious software intended by the attacker to create security breaches through the use of APIs from various services on the internet. By default, the non-attentive URL downloads and installs malware in the background without the user’s knowledge. The host does not analyze the API-URL security certificate contract due to the feature access by the user. Therefore, the current Machine Learning (ML) techniques only check malware signatures and certificates rather than analyzing URL behaviour based on the impact of a URL accessed from the internet. To address this problem, we propose a novel intelligent malicious software based on URL-API intensity feature selection (IFS) and deep spectral neural classification (DSNC) for improving Host Security. Initially, the URL — successive certificate signing (SCS) of the user link accessibility is verified based on API download rate logs. This system identifies the best malware software. The Link Redirection Stability Rate (LRSR) is estimated based on the Redirection URL by accessing the direct link and redirect link. The domain transformation matrix (DTM) was created to create a pattern to access successive features. URL-API Intensity Feature Selection selects each estimated feature, and the selected features are based on soft-max logical activation with a recurrent neural network (RNN) optimized for deep learning. RNN is trained in the spectral domain for improving computation and efficiency. It predicts the class based on the risk of malicious weight to categorize class by reference. The proposed IFS-DSNC achieves accuracy of 95.6% than the other algorithms such as KNN, NB, CNN, LCS, GCRNC AGSCR. The experimental result shows that the proposed method provides better performance in finding malware software than the existing approaches, thereby improving the security against host breaching.","PeriodicalId":422521,"journal":{"name":"Int. J. Comput. Intell. Appl.","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123814384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Data Fusion Technique for Improving the Data Transmission Rate in Wireless Sensor Networks 一种提高无线传感器网络数据传输速率的智能数据融合技术
Pub Date : 2023-03-31 DOI: 10.1142/s1469026823410043
R. Lavanya, N. Shanmugapriya
Wireless Sensor Networks (WSNs) are made up of multiple source-restricted wireless sensor nodes that gather, process, and transmit information. Existing research work proposed energy competence with trust as well as Quality of Service (QoS) multipath routing protocol for improving network lifetime and other QoS parameters, selection criteria for multipath. However, this protocol has some limitations, such as scalability, data redundancy, bandwidth utilization, and network traffic. The most important challenge lies in managing the voluminous data produced by the network’s sensors. As a result of this study, Intelligent Data Fusion Techniques (IDFTs) were presented, which can greatly minimize redundant data, decrease the quantity of transmitting data, broaden the network life cycle, enhance bandwidth utilization, and therefore, resolve the energy and bandwidth usage bottleneck. This paper proposes Improved Whale Optimization Algorithms (IWOAs) for intelligent data fusion where the amount of data collected from sensor sources is reduced and the information offered is enhanced by duplicate data, which also increases data dependability. IWOAs are used to combine the actual information from the cluster’s sensor nodes at the sink node, resulting in increased information and the ability to make local judgments about the particular events. The sink node transmits local decisions to base station on a regular basis that combines the local decisions and provides the ultimate judgment, easing the pressure on the base station to evaluate all of the data. As per the results obtained, the proposed intelligent data fusion method significantly increases the network’s robustness and accuracy.
无线传感器网络(wsn)由多个受源限制的无线传感器节点组成,用于收集、处理和传输信息。现有的研究工作提出了具有信任的能量能力和服务质量(QoS)的多路径路由协议,以提高网络生存期和其他QoS参数,多路径选择标准。但是,该协议存在一些限制,如可伸缩性、数据冗余、带宽利用率和网络流量等。最重要的挑战在于如何管理网络传感器产生的海量数据。在此基础上,提出了智能数据融合技术(Intelligent Data Fusion Techniques, IDFTs),该技术可以极大地减少冗余数据,减少数据传输量,延长网络生命周期,提高带宽利用率,从而解决能源和带宽的使用瓶颈。本文提出了改进的鲸鱼优化算法(IWOAs)用于智能数据融合,该算法减少了从传感器源收集的数据量,并通过重复数据增强了提供的信息,从而提高了数据的可靠性。iwoa用于在汇聚节点上组合来自集群传感器节点的实际信息,从而增加信息并能够对特定事件做出本地判断。汇聚节点定期向基站发送本地决策,并结合本地决策提供最终判断,减轻了基站评估所有数据的压力。结果表明,所提出的智能数据融合方法显著提高了网络的鲁棒性和准确性。
{"title":"An Intelligent Data Fusion Technique for Improving the Data Transmission Rate in Wireless Sensor Networks","authors":"R. Lavanya, N. Shanmugapriya","doi":"10.1142/s1469026823410043","DOIUrl":"https://doi.org/10.1142/s1469026823410043","url":null,"abstract":"Wireless Sensor Networks (WSNs) are made up of multiple source-restricted wireless sensor nodes that gather, process, and transmit information. Existing research work proposed energy competence with trust as well as Quality of Service (QoS) multipath routing protocol for improving network lifetime and other QoS parameters, selection criteria for multipath. However, this protocol has some limitations, such as scalability, data redundancy, bandwidth utilization, and network traffic. The most important challenge lies in managing the voluminous data produced by the network’s sensors. As a result of this study, Intelligent Data Fusion Techniques (IDFTs) were presented, which can greatly minimize redundant data, decrease the quantity of transmitting data, broaden the network life cycle, enhance bandwidth utilization, and therefore, resolve the energy and bandwidth usage bottleneck. This paper proposes Improved Whale Optimization Algorithms (IWOAs) for intelligent data fusion where the amount of data collected from sensor sources is reduced and the information offered is enhanced by duplicate data, which also increases data dependability. IWOAs are used to combine the actual information from the cluster’s sensor nodes at the sink node, resulting in increased information and the ability to make local judgments about the particular events. The sink node transmits local decisions to base station on a regular basis that combines the local decisions and provides the ultimate judgment, easing the pressure on the base station to evaluate all of the data. As per the results obtained, the proposed intelligent data fusion method significantly increases the network’s robustness and accuracy.","PeriodicalId":422521,"journal":{"name":"Int. J. Comput. Intell. Appl.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124974976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive Weight Dynamic Butterfly Optimization Algorithm (ADBOA)-Based Feature Selection and Classifier for Chronic Kidney Disease (CKD) Diagnosis 基于自适应权重动态蝴蝶优化算法(ADBOA)的慢性肾脏疾病(CKD)诊断特征选择与分类器
Pub Date : 2023-03-31 DOI: 10.1142/s1469026823410018
T. Saroja, Y. Kalpana
Chronic Kidney Disease (CKD) are a universal issue for the well-being of people as they result in morbidities and deaths with the onset of additional diseases. Because there are no clear early symptoms of CKD, people frequently miss them. Timely identification of CKD allows individuals to acquire proper medications to prevent the development of the diseases. Machine learning technique (MLT) can strongly assist doctors in achieving this aim due to their rapid and precise determination capabilities. Many MLT encounter inappropriate features in most databases that might lower the classifier’s performance. Missing values are filled using K-Nearest Neighbor (KNN). Adaptive Weight Dynamic Butterfly Optimization Algorithm (AWDBOA) are nature-inspired feature selection (FS) techniques with good explorations, exploitations, convergences, and do not get trapped in local optimums. Operators used in Local Search Algorithm-Based Mutation (LSAM) and Butterfly Optimization Algorithm (BOA) which use diversity and generations of adaptive weights to features for enhancing FS are modified in this work. Simultaneously, an adaptive weight value is added for FS from the database. Following the identification of features, six MLT are used in classification tasks namely Logistic Regressions (LOG), Random Forest (RF), Support Vector Machine (SVM), KNNs, Naive Baye (NB), and Feed Forward Neural Network (FFNN). The CKD databases were retrieved from MLT repository of UCI (University of California, Irvine). Precision, Recall, F1-Score, Sensitivity, Specificity, and accuracy are compared to assess this work’s classification framework with existing approaches.
慢性肾脏疾病(CKD)是一个普遍的问题,对人们的福祉,因为他们导致发病率和死亡与其他疾病的发作。由于CKD没有明确的早期症状,人们经常忽略它们。及时识别CKD可以让个人获得适当的药物来预防疾病的发展。机器学习技术(MLT)由于其快速和精确的检测能力,可以有力地帮助医生实现这一目标。许多MLT在大多数数据库中遇到不合适的特征,这可能会降低分类器的性能。缺失值使用k近邻(KNN)填充。自适应加权动态蝴蝶优化算法(AWDBOA)是一种受自然启发的特征选择(FS)技术,具有良好的探索、利用和收敛性,并且不会陷入局部最优。本文对基于局部搜索算法的突变算子(LSAM)和蝴蝶优化算法(BOA)中使用的算子进行了改进,这些算子利用特征的多样性和自适应权值的生成来增强FS。同时,从数据库中为FS添加自适应权重值。在特征识别之后,六种MLT被用于分类任务,即逻辑回归(LOG)、随机森林(RF)、支持向量机(SVM)、KNNs、朴素贝叶斯(NB)和前馈神经网络(FFNN)。CKD数据库从UCI (University of California, Irvine)的MLT存储库中检索。将精密度、召回率、f1评分、敏感性、特异性和准确性与现有方法进行比较,以评估本工作的分类框架。
{"title":"Adaptive Weight Dynamic Butterfly Optimization Algorithm (ADBOA)-Based Feature Selection and Classifier for Chronic Kidney Disease (CKD) Diagnosis","authors":"T. Saroja, Y. Kalpana","doi":"10.1142/s1469026823410018","DOIUrl":"https://doi.org/10.1142/s1469026823410018","url":null,"abstract":"Chronic Kidney Disease (CKD) are a universal issue for the well-being of people as they result in morbidities and deaths with the onset of additional diseases. Because there are no clear early symptoms of CKD, people frequently miss them. Timely identification of CKD allows individuals to acquire proper medications to prevent the development of the diseases. Machine learning technique (MLT) can strongly assist doctors in achieving this aim due to their rapid and precise determination capabilities. Many MLT encounter inappropriate features in most databases that might lower the classifier’s performance. Missing values are filled using K-Nearest Neighbor (KNN). Adaptive Weight Dynamic Butterfly Optimization Algorithm (AWDBOA) are nature-inspired feature selection (FS) techniques with good explorations, exploitations, convergences, and do not get trapped in local optimums. Operators used in Local Search Algorithm-Based Mutation (LSAM) and Butterfly Optimization Algorithm (BOA) which use diversity and generations of adaptive weights to features for enhancing FS are modified in this work. Simultaneously, an adaptive weight value is added for FS from the database. Following the identification of features, six MLT are used in classification tasks namely Logistic Regressions (LOG), Random Forest (RF), Support Vector Machine (SVM), KNNs, Naive Baye (NB), and Feed Forward Neural Network (FFNN). The CKD databases were retrieved from MLT repository of UCI (University of California, Irvine). Precision, Recall, F1-Score, Sensitivity, Specificity, and accuracy are compared to assess this work’s classification framework with existing approaches.","PeriodicalId":422521,"journal":{"name":"Int. J. Comput. Intell. Appl.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126402408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Comput. Intell. Appl.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1