首页 > 最新文献

Web Intelligence最新文献

英文 中文
Combined optimization strategy: CUBW for load balancing in software defined network 组合优化策略:用于软件定义网络负载平衡的 CUBW
IF 0.3 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-01-05 DOI: 10.3233/web-230263
Sonam Sharma, Dambarudhar Seth, Manoj Kapil
Software Defined Network (SDN) facilitates a centralized control management of devices in network, which solves many issues in the old network. However, as the modern era generates a vast amount of data, the controller in an SDN could become overloaded. Numerous investigators have offered their opinions on how to address the issue of controller overloading in order to resolve it. Mostly the traditional models consider two or three parameters to evenly distribute the load in SDN, which is not sufficient for precise load balancing strategy. Hence, an effective load balancing model is in need that considers different parameters. Considering this aspect, this paper presents a new load balancing model in SDN is introduced by following three major phases: (a) work load prediction, (b) optimal load balancing, and (c) switch migration. Initially, work load prediction is done via improved Deep Maxout Network. COA and BWO are conceptually combined in the proposed hybrid optimization technique known as Coati Updated Black Widow (CUBW). Then, the optimal load balancing is done via hybrid optimization named Coati Updated Black Widow (CUBW) Optimization Algorithm. The optimal load balancing is done by considering migration time, migration cost, distance and load balancing parameters like server load, response time and turnaround time. Finally, switch migration is carried out by considering the constraints like migration time, migration cost, and distance. The migration time of the proposed method achieves lower value, which is 27.3%, 40.8%, 24.40%, 41.8%, 42.8%, 42.2%, 40.0%, and 41.6% higher than the previous models like BMO, BES, AOA, TDO, CSO, GLSOM, HDD-PLB, BWO and COA respectively. Finally, the performance of proposed work is validated over the conventional methods in terms of different analysis.
软件定义网络(SDN)有利于集中控制管理网络中的设备,解决了旧网络中的许多问题。然而,由于现代社会产生了大量数据,SDN 中的控制器可能会超载。如何解决控制器过载问题,众多研究者提出了自己的看法。传统模型大多考虑两个或三个参数来平均分配 SDN 中的负载,但这不足以实现精确的负载平衡策略。因此,需要一种考虑不同参数的有效负载平衡模型。考虑到这一点,本文通过以下三个主要阶段介绍了一种新的 SDN 负载平衡模型:(a)工作负载预测;(b)优化负载平衡;(c)交换机迁移。最初,工作负载预测是通过改进的深度 Maxout 网络完成的。COA 和 BWO 在概念上被结合到所提出的混合优化技术中,即 Coati Updated Black Widow (CUBW)。然后,通过名为 Coati Updated Black Widow (CUBW) 优化算法的混合优化技术实现最佳负载平衡。最佳负载平衡是通过考虑迁移时间、迁移成本、距离以及服务器负载、响应时间和周转时间等负载平衡参数来实现的。最后,通过考虑迁移时间、迁移成本和迁移距离等约束条件,进行交换机迁移。与 BMO、BES、AOA、TDO、CSO、GLSOM、HDD-PLB、BWO 和 COA 等先前的模型相比,提议方法的迁移时间达到了较低的值,分别为 27.3%、40.8%、24.40%、41.8%、42.8%、42.2%、40.0% 和 41.6%。最后,从不同的分析角度验证了所提方法优于传统方法的性能。
{"title":"Combined optimization strategy: CUBW for load balancing in software defined network","authors":"Sonam Sharma, Dambarudhar Seth, Manoj Kapil","doi":"10.3233/web-230263","DOIUrl":"https://doi.org/10.3233/web-230263","url":null,"abstract":"Software Defined Network (SDN) facilitates a centralized control management of devices in network, which solves many issues in the old network. However, as the modern era generates a vast amount of data, the controller in an SDN could become overloaded. Numerous investigators have offered their opinions on how to address the issue of controller overloading in order to resolve it. Mostly the traditional models consider two or three parameters to evenly distribute the load in SDN, which is not sufficient for precise load balancing strategy. Hence, an effective load balancing model is in need that considers different parameters. Considering this aspect, this paper presents a new load balancing model in SDN is introduced by following three major phases: (a) work load prediction, (b) optimal load balancing, and (c) switch migration. Initially, work load prediction is done via improved Deep Maxout Network. COA and BWO are conceptually combined in the proposed hybrid optimization technique known as Coati Updated Black Widow (CUBW). Then, the optimal load balancing is done via hybrid optimization named Coati Updated Black Widow (CUBW) Optimization Algorithm. The optimal load balancing is done by considering migration time, migration cost, distance and load balancing parameters like server load, response time and turnaround time. Finally, switch migration is carried out by considering the constraints like migration time, migration cost, and distance. The migration time of the proposed method achieves lower value, which is 27.3%, 40.8%, 24.40%, 41.8%, 42.8%, 42.2%, 40.0%, and 41.6% higher than the previous models like BMO, BES, AOA, TDO, CSO, GLSOM, HDD-PLB, BWO and COA respectively. Finally, the performance of proposed work is validated over the conventional methods in terms of different analysis.","PeriodicalId":42775,"journal":{"name":"Web Intelligence","volume":"14 4","pages":""},"PeriodicalIF":0.3,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139383291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Customer Loyalty vs. Customer Retention: The Impact of Customer Relationship Management on Customer Satisfaction 客户忠诚度与客户保留率:客户关系管理对客户满意度的影响
IF 0.3 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-01-04 DOI: 10.3233/web-230098
Ram Kumar Dwivedi, Shailee Lohmor Choudhary, R. Dixit, Zainab Sahiba, Satyaprakash Naik
In this competitive world, companies should sustain good relationships with their consumers. CRM (customer relationship management) program can improve the company’s customer satisfaction; to satisfy customer need different processes and technique are established to make the CRM more effective. This research is proposed to determine the relationship between customer loyalty and retention. Also, this research examines the impact of Customer Relationship Management (CRM) on Customer Satisfaction. The target population of this study is customers of the tourism industry in India ( n = 300). Then, regression analysis is carried out in order to discover the link between the variables. This study result shows that service quality and employee behavior of customer need and satisfaction with the effect of different significant of positive relation of both the variables. To make the customer satisfied and to retain their company the CRM should be strong and reliable with the consumers. CRM plays a vital role in increasing market share, high productivity, improving in-depth customer knowledge, and customer satisfaction to increase consumer loyalty to the company to have a clear view of who is their customer, what are the need of their customer and how can satisfy their needs and wants their customers.
在这个竞争激烈的世界,企业应与消费者保持良好的关系。客户关系管理(CRM)项目可以提高公司的客户满意度;为满足客户需求,公司建立了不同的流程和技术,使客户关系管理更加有效。本研究旨在确定客户忠诚度与客户保留率之间的关系。此外,本研究还将探讨客户关系管理(CRM)对客户满意度的影响。本研究的目标人群是印度旅游业的客户(n = 300)。然后进行回归分析,以发现变量之间的联系。研究结果表明,服务质量和员工行为对客户需求和满意度的影响不同,两个变量之间存在显著的正相关关系。为了让客户满意并留住他们的公司,客户关系管理应该对消费者来说是强大而可靠的。客户关系管理在增加市场份额、提高生产率、深入了解客户、提高客户满意度、增加消费者对公司的忠诚度等方面发挥着至关重要的作用。
{"title":"The Customer Loyalty vs. Customer Retention: The Impact of Customer Relationship Management on Customer Satisfaction","authors":"Ram Kumar Dwivedi, Shailee Lohmor Choudhary, R. Dixit, Zainab Sahiba, Satyaprakash Naik","doi":"10.3233/web-230098","DOIUrl":"https://doi.org/10.3233/web-230098","url":null,"abstract":"In this competitive world, companies should sustain good relationships with their consumers. CRM (customer relationship management) program can improve the company’s customer satisfaction; to satisfy customer need different processes and technique are established to make the CRM more effective. This research is proposed to determine the relationship between customer loyalty and retention. Also, this research examines the impact of Customer Relationship Management (CRM) on Customer Satisfaction. The target population of this study is customers of the tourism industry in India ( n = 300). Then, regression analysis is carried out in order to discover the link between the variables. This study result shows that service quality and employee behavior of customer need and satisfaction with the effect of different significant of positive relation of both the variables. To make the customer satisfied and to retain their company the CRM should be strong and reliable with the consumers. CRM plays a vital role in increasing market share, high productivity, improving in-depth customer knowledge, and customer satisfaction to increase consumer loyalty to the company to have a clear view of who is their customer, what are the need of their customer and how can satisfy their needs and wants their customers.","PeriodicalId":42775,"journal":{"name":"Web Intelligence","volume":"56 16","pages":""},"PeriodicalIF":0.3,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139384936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supply chain management with secured data transmission via improved DNA cryptosystem 通过改进的 DNA 密码系统进行安全数据传输的供应链管理
IF 0.3 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-12-12 DOI: 10.3233/web-230105
P. Lahane, Shivaji R. Lahane
Supply chain management (SCM) is most significant place of concentration in various corporate circumstances. SCM has both designed and monitored numerous tasks with the following phases such as allocation, creation, product sourcing, and warehousing. Based on this perspective, the privacy of data flow is more important among producers, suppliers, and customers to ensure the responsibility of the market. This work aims to develop a novel Improved Digital Navigator Assessment (DNA)-based Self Improved Pelican Optimization Algorithm (IDNA-based SIPOA model) for secured data transmission in SCM via blockchain. An improved DNA cryptosystem is done for the process of preservation for data. The original message is encrypted by Improved Advanced Encryption Standard (IAES). The optimal key generation is done by the proposed SIPOA algorithm. The efficiency of the adopted model has been analyzed with conventional methods with regard to security for secured data exchange in SCM. The proposed IDNA-based SIPOA obtained the lowest value for the 40% cypher text is 0.71, while the BWO is 0.79, DOA is 0.77, TWOA is 0.84, BOA is 0.83, POA is 0.86, SDSM is 0.88, DNASF is 0.82 and FSA-SLnO is 0.78, respectively.
供应链管理(SCM)是各种企业环境中最重要的集中地。供应链管理的设计和监控任务繁多,包括分配、创建、产品采购和仓储等阶段。从这个角度看,数据流在生产商、供应商和客户之间的私密性对确保市场责任更为重要。这项工作旨在开发一种新颖的基于改进数字导航评估(DNA)的自改进鹈鹕优化算法(基于 IDNA 的 SIPOA 模型),通过区块链实现供应链管理中的安全数据传输。在数据保存过程中使用了改进的 DNA 密码系统。原始信息由改进高级加密标准(IAES)加密。最佳密钥生成由建议的 SIPOA 算法完成。在单片机安全数据交换的安全性方面,对所采用模型的效率与传统方法进行了分析。所提出的基于 IDNA 的 SIPOA 算法获得的 40% 加密文本的最低值为 0.71,而 BWO 为 0.79,DOA 为 0.77,TWOA 为 0.84,BOA 为 0.83,POA 为 0.86,SDSM 为 0.88,DNASF 为 0.82,FSA-SLnO 为 0.78。
{"title":"Supply chain management with secured data transmission via improved DNA cryptosystem","authors":"P. Lahane, Shivaji R. Lahane","doi":"10.3233/web-230105","DOIUrl":"https://doi.org/10.3233/web-230105","url":null,"abstract":"Supply chain management (SCM) is most significant place of concentration in various corporate circumstances. SCM has both designed and monitored numerous tasks with the following phases such as allocation, creation, product sourcing, and warehousing. Based on this perspective, the privacy of data flow is more important among producers, suppliers, and customers to ensure the responsibility of the market. This work aims to develop a novel Improved Digital Navigator Assessment (DNA)-based Self Improved Pelican Optimization Algorithm (IDNA-based SIPOA model) for secured data transmission in SCM via blockchain. An improved DNA cryptosystem is done for the process of preservation for data. The original message is encrypted by Improved Advanced Encryption Standard (IAES). The optimal key generation is done by the proposed SIPOA algorithm. The efficiency of the adopted model has been analyzed with conventional methods with regard to security for secured data exchange in SCM. The proposed IDNA-based SIPOA obtained the lowest value for the 40% cypher text is 0.71, while the BWO is 0.79, DOA is 0.77, TWOA is 0.84, BOA is 0.83, POA is 0.86, SDSM is 0.88, DNASF is 0.82 and FSA-SLnO is 0.78, respectively.","PeriodicalId":42775,"journal":{"name":"Web Intelligence","volume":"36 10","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139008870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid deep model for predicting anti-cancer drug efficacy in colorectal cancer patients 预测结直肠癌患者抗癌药物疗效的混合深度模型
IF 0.3 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-12-08 DOI: 10.3233/web-230260
A. Karthikeyan, S. Jothilakshmi, S. Suthir
Cancers are genetically diversified, so anticancer treatments have different levels of efficacy on people due to genetic differences. The main objective of this work is to predict the anticancer drug efficiency for colorectal cancer patients to reduce the mortality rates and provides immune energy for the patients. This paper proposes a novel anti-cancer drug efficacy system in colorectal cancer patients. The input data gene is normalized with the Min–Max normalization technique that normalizes the data in distinct scales. Subsequently, proposes an improved entropy-based feature to evaluate the uncertainty distribution of data, in which it induces weight to overcome the issue of computational complexity. Along with this feature, a correlation-based feature and statistical features are also retrieved. Subsequently, proposes a Recursive Feature Elimination with Hybrid Machine Learning (RFEHML) mechanism for selecting the appropriate feature set by eliminating the recursive features with the aid of hybrid Machine Learning strategies that combine decision tree and logistic regression. Also, the Gini impurity is employed for ranking the feature and selecting the maximum importance score by eliminating the least acquired importance score. Further, proposes a hybrid model for predicting the drug efficiency with the trained feature set. The hybrid model comprises of Long Short-Term Memory (LSTM) and Updated Rectified Linear Unit-Deep Convolutional Neural Network (UReLU-DCNN) model, in which DCNN is modified by updating the activation function at the fully connected layer. Consequently, the learned feature predicts the drug efficacy of anti-cancer in colorectal cancer patients by determining whether the patient is a responder or non-responder of the drug. Finally, the performance of the proposed RFEHML model is compared with other traditional approaches. It is found that the developed method has higher accuracy for each learning percentage, with values of 60LP = 92.48%, 70LP = 94.28%, 80LP = 95.24%, and 90LP = 96.86%, respectively.
癌症在基因上是多样化的,因此由于基因的差异,抗癌治疗对人们的疗效也不同。本工作的主要目的是预测结直肠癌患者的抗癌药物疗效,降低死亡率,为患者提供免疫能量。本文提出了一种新的结直肠癌患者抗癌药物疗效体系。使用Min-Max归一化技术对输入数据基因进行归一化,该技术对不同尺度的数据进行归一化。随后,提出了一种改进的基于熵的特征来评估数据的不确定性分布,该特征引入权重来克服计算复杂性的问题。与此特征一起,还检索了基于相关性的特征和统计特征。随后,提出了一种基于混合机器学习的递归特征消除(RFEHML)机制,通过结合决策树和逻辑回归的混合机器学习策略消除递归特征来选择合适的特征集。此外,基尼杂质用于对特征进行排序,并通过消除最小获得的重要分数来选择最大重要分数。在此基础上,提出了利用训练好的特征集预测药物效率的混合模型。该混合模型包括长短期记忆(LSTM)和更新的整流线性单元-深度卷积神经网络(UReLU-DCNN)模型,其中DCNN通过更新全连接层的激活函数来修正。因此,学习特征通过判断患者对药物是否有反应来预测结直肠癌患者的抗癌疗效。最后,将所提出的RFEHML模型的性能与其他传统方法进行了比较。研究发现,所开发的方法在每个学习百分比上都有较高的准确率,60LP = 92.48%, 70LP = 94.28%, 80LP = 95.24%, 90LP = 96.86%。
{"title":"Hybrid deep model for predicting anti-cancer drug efficacy in colorectal cancer patients","authors":"A. Karthikeyan, S. Jothilakshmi, S. Suthir","doi":"10.3233/web-230260","DOIUrl":"https://doi.org/10.3233/web-230260","url":null,"abstract":"Cancers are genetically diversified, so anticancer treatments have different levels of efficacy on people due to genetic differences. The main objective of this work is to predict the anticancer drug efficiency for colorectal cancer patients to reduce the mortality rates and provides immune energy for the patients. This paper proposes a novel anti-cancer drug efficacy system in colorectal cancer patients. The input data gene is normalized with the Min–Max normalization technique that normalizes the data in distinct scales. Subsequently, proposes an improved entropy-based feature to evaluate the uncertainty distribution of data, in which it induces weight to overcome the issue of computational complexity. Along with this feature, a correlation-based feature and statistical features are also retrieved. Subsequently, proposes a Recursive Feature Elimination with Hybrid Machine Learning (RFEHML) mechanism for selecting the appropriate feature set by eliminating the recursive features with the aid of hybrid Machine Learning strategies that combine decision tree and logistic regression. Also, the Gini impurity is employed for ranking the feature and selecting the maximum importance score by eliminating the least acquired importance score. Further, proposes a hybrid model for predicting the drug efficiency with the trained feature set. The hybrid model comprises of Long Short-Term Memory (LSTM) and Updated Rectified Linear Unit-Deep Convolutional Neural Network (UReLU-DCNN) model, in which DCNN is modified by updating the activation function at the fully connected layer. Consequently, the learned feature predicts the drug efficacy of anti-cancer in colorectal cancer patients by determining whether the patient is a responder or non-responder of the drug. Finally, the performance of the proposed RFEHML model is compared with other traditional approaches. It is found that the developed method has higher accuracy for each learning percentage, with values of 60LP = 92.48%, 70LP = 94.28%, 80LP = 95.24%, and 90LP = 96.86%, respectively.","PeriodicalId":42775,"journal":{"name":"Web Intelligence","volume":"2 3","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138589965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stock market prediction-COVID-19 scenario with lexicon-based approach 股票市场预测--基于词典方法的 COVID-19 方案
IF 0.3 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-12-01 DOI: 10.3233/web-230092
Y. Ayyappa, A.P. Siva Kumar
Stock market forecasting remains a difficult problem in the economics industry due to its incredible stochastic nature. The creation of such an expert system aids investors in making investment decisions about a certain company. Due to the complexity of the stock market, using a single data source is insufficient to accurately reflect all of the variables that influence stock fluctuations. However, predicting stock market movement is a challenging undertaking that requires extensive data analysis, particularly from a big data perspective. In order to address these problems and produce a feasible solution, appropriate statistical models and artificially intelligent algorithms are needed. This paper aims to propose a novel stock market prediction by the following four stages; they are, preprocessing, feature extraction, improved feature level fusion and prediction. The input data is first put through a preparation step in which stock, news, and Twitter data (related to the COVID-19 epidemic) are processed. Under the big data perspective, the input data is taken into account. These pre-processed data are then put through the feature extraction, The improved aspect-based lexicon generation, PMI, and n-gram-based features in this case are derived from the news and Twitter data, while technical indicator-based features are derived from the stock data. The improved feature-level fusion phase is then applied to the extracted features. The ensemble classifiers, which include DBN, CNN, and DRN, were proposed during the prediction phase. Additionally, a SI-MRFO model is suggested to enhance the efficiency of the prediction model by adjusting the best classifier weights. Finally, SI-MRFO model’s effectiveness compared to the existing models with regard to MAE, MAPE, MSE and MSLE. The SI-MRFO accomplished the minimal MAE rate for the 90th learning percentage is approximately 0.015 while other models acquire maximum ratings.
股票市场预测由于其难以置信的随机性,一直是经济学领域的一个难题。这种专家系统的创建有助于投资者对某一公司做出投资决策。由于股票市场的复杂性,使用单一数据源不足以准确反映影响股票波动的所有变量。然而,预测股市走势是一项具有挑战性的工作,需要大量的数据分析,尤其是从大数据的角度。为了解决这些问题并产生可行的解决方案,需要适当的统计模型和人工智能算法。本文旨在通过以下四个阶段提出一种新的股票市场预测方法:它们是预处理、特征提取、改进的特征级融合和预测。输入的数据首先要经过一个准备步骤,在这个步骤中处理股票、新闻和Twitter数据(与COVID-19疫情有关)。在大数据视角下,输入数据被考虑在内。然后将这些预处理过的数据进行特征提取,本例中改进的基于方面的词典生成、PMI和基于n-gram的特征来自新闻和Twitter数据,而基于技术指标的特征来自股票数据。然后将改进的特征级融合阶段应用于提取的特征。在预测阶段提出了包括DBN、CNN和DRN在内的集成分类器。此外,还提出了一种SI-MRFO模型,通过调整最佳分类器权重来提高预测模型的效率。最后,对比了SI-MRFO模型在MAE、MAPE、MSE和MSLE方面与现有模型的有效性。SI-MRFO在第90个学习百分比的最小MAE率约为0.015,而其他模型获得最大评级。
{"title":"Stock market prediction-COVID-19 scenario with lexicon-based approach","authors":"Y. Ayyappa, A.P. Siva Kumar","doi":"10.3233/web-230092","DOIUrl":"https://doi.org/10.3233/web-230092","url":null,"abstract":"Stock market forecasting remains a difficult problem in the economics industry due to its incredible stochastic nature. The creation of such an expert system aids investors in making investment decisions about a certain company. Due to the complexity of the stock market, using a single data source is insufficient to accurately reflect all of the variables that influence stock fluctuations. However, predicting stock market movement is a challenging undertaking that requires extensive data analysis, particularly from a big data perspective. In order to address these problems and produce a feasible solution, appropriate statistical models and artificially intelligent algorithms are needed. This paper aims to propose a novel stock market prediction by the following four stages; they are, preprocessing, feature extraction, improved feature level fusion and prediction. The input data is first put through a preparation step in which stock, news, and Twitter data (related to the COVID-19 epidemic) are processed. Under the big data perspective, the input data is taken into account. These pre-processed data are then put through the feature extraction, The improved aspect-based lexicon generation, PMI, and n-gram-based features in this case are derived from the news and Twitter data, while technical indicator-based features are derived from the stock data. The improved feature-level fusion phase is then applied to the extracted features. The ensemble classifiers, which include DBN, CNN, and DRN, were proposed during the prediction phase. Additionally, a SI-MRFO model is suggested to enhance the efficiency of the prediction model by adjusting the best classifier weights. Finally, SI-MRFO model’s effectiveness compared to the existing models with regard to MAE, MAPE, MSE and MSLE. The SI-MRFO accomplished the minimal MAE rate for the 90th learning percentage is approximately 0.015 while other models acquire maximum ratings.","PeriodicalId":42775,"journal":{"name":"Web Intelligence","volume":"114 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138622322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel authentication scheme for secure data sharing in IoT enabled agriculture 物联网农业数据安全共享的新型认证方案
IF 0.3 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-28 DOI: 10.3233/web-230244
Arun A. Kumbi, M. Birje
Now a days, the Internet of Things (IoT) plays a vital role in every industry including agriculture due to its widespread and easy integrations. The agricultural methods are incorporated with IoT technologies for significant growth in agricultural fields. IoT is utilized to support farmers in using their resources effectively and support decision-making systems with better field monitoring techniques. The data collected from IoT-based agricultural systems are highly vulnerable to attack, hence to address this issue it is necessary to employ an authentication scheme. In this paper, Auth Key_Deep Convolutional Neural Network (Auth Key_DCNN) is designed to promote secure data sharing in IoT-enabled agriculture systems. The different entities, namely sensors, Private Key Generator (PKG), controller, and data user are initially considered and the parameters are randomly initialized. The entities are registered and by using DCNN a secret key is generated in PKG. The encryption of transmitted data is performed in the data protection phase during the protection of data between the controller and the user. Additionally, the performance of the designed model is estimated, where the experimental results revealed that the Auth Key_DCNN model recorded superior performance with a minimal computational cost of 142.56, a memory usage of 49.5 MB, and a computational time of 1.34 sec.
如今,物联网(IoT)因其广泛和易于集成的特点,在包括农业在内的各行各业都发挥着至关重要的作用。农业方法与物联网技术相结合,促进了农业领域的显著发展。物联网可帮助农民有效利用资源,并通过更好的田间监测技术为决策系统提供支持。从基于物联网的农业系统中收集的数据极易受到攻击,因此有必要采用一种身份验证方案来解决这一问题。本文设计了 Auth Key_Deep 卷积神经网络(Auth Key_DCNN),以促进物联网农业系统中的安全数据共享。最初考虑了不同的实体,即传感器、私钥生成器(PKG)、控制器和数据用户,并随机初始化了参数。各实体注册后,使用 DCNN 在 PKG 中生成密钥。在数据保护阶段,在控制器和用户之间的数据保护过程中,对传输的数据进行加密。此外,还对所设计模型的性能进行了评估,实验结果表明 Auth Key_DCNN 模型性能优越,计算成本最低,为 142.56 美元,内存使用量为 49.5 MB,计算时间为 1.34 秒。
{"title":"A novel authentication scheme for secure data sharing in IoT enabled agriculture","authors":"Arun A. Kumbi, M. Birje","doi":"10.3233/web-230244","DOIUrl":"https://doi.org/10.3233/web-230244","url":null,"abstract":"Now a days, the Internet of Things (IoT) plays a vital role in every industry including agriculture due to its widespread and easy integrations. The agricultural methods are incorporated with IoT technologies for significant growth in agricultural fields. IoT is utilized to support farmers in using their resources effectively and support decision-making systems with better field monitoring techniques. The data collected from IoT-based agricultural systems are highly vulnerable to attack, hence to address this issue it is necessary to employ an authentication scheme. In this paper, Auth Key_Deep Convolutional Neural Network (Auth Key_DCNN) is designed to promote secure data sharing in IoT-enabled agriculture systems. The different entities, namely sensors, Private Key Generator (PKG), controller, and data user are initially considered and the parameters are randomly initialized. The entities are registered and by using DCNN a secret key is generated in PKG. The encryption of transmitted data is performed in the data protection phase during the protection of data between the controller and the user. Additionally, the performance of the designed model is estimated, where the experimental results revealed that the Auth Key_DCNN model recorded superior performance with a minimal computational cost of 142.56, a memory usage of 49.5 MB, and a computational time of 1.34 sec.","PeriodicalId":42775,"journal":{"name":"Web Intelligence","volume":"77 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139225993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep hybrid model for attack detection in IoT-fog architecture with improved feature set and optimal training 利用改进的特征集和优化的训练,在物联网-雾架构中建立深度混合模型进行攻击检测
IF 0.3 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-11-27 DOI: 10.3233/web-230187
N. Pokale, Pooja Sharma, Deepak T. Mane
IoT-Fog computing provides a wide range of services for end-based IoT systems. End IoT devices interface with cloud nodes and fog nodes to manage client tasks. Critical attacks like DDoS and other security risks are more likely to compromise IoT end devices while they are collecting data between the fog and the cloud layer. It’s important to find these network vulnerabilities early. By extracting features and placing the danger in the network, DL is crucial in predicting end-user behavior. However, deep learning cannot be carried out on Internet of Things devices because to their constrained calculation and storage capabilities. In this research, we suggest a three-stage Deep Hybrid Detection Model for Attack Detection in IoT-Fog Architecture. Improved Z-score normalization-based data preparation will be carried out in the initial step. On the basis of preprocessed data, features like IG, raw data, entropy, and enhanced MI are extracted in the second step. The collected characteristics are used as input to hybrid classifiers dubbed optimized Deep Maxout and Deep Belief Network (DBN) in the third step of the process to classify the assaults based on the input dataset. A hybrid optimization model called the BMUJFO (Blue Monkey Updated Jellyfish Optimization) technique is presented for the best Deep Maxout training. Additionally, the suggested model produced higher accuracy, precision, sensitivity, and specificity results, with values of 95.26 percent, 94.84%, 96.28%, and 97.84%, respectively.
物联网-雾计算为基于终端的物联网系统提供广泛的服务。终端物联网设备与云节点和雾节点对接,以管理客户端任务。当物联网终端设备在雾和云层之间收集数据时,DDoS 等关键攻击和其他安全风险更有可能危及这些设备。及早发现这些网络漏洞非常重要。通过提取特征并将危险置于网络中,DL 对预测终端用户行为至关重要。然而,由于计算和存储能力有限,深度学习无法在物联网设备上进行。在这项研究中,我们提出了一种用于物联网-雾架构中攻击检测的三阶段深度混合检测模型。第一步将进行基于 Z 分数归一化的改进数据准备。在预处理数据的基础上,第二步将提取 IG、原始数据、熵和增强 MI 等特征。在第三步中,收集到的特征将被用作混合分类器的输入,这些分类器被称为优化的深度 Maxout 和深度信念网络 (DBN),以便根据输入数据集对攻击进行分类。为了获得最佳的 Deep Maxout 训练效果,提出了一种名为 BMUJFO(Blue Monkey Updated Jellyfish Optimization)技术的混合优化模型。此外,建议的模型产生了更高的准确度、精确度、灵敏度和特异性结果,数值分别为 95.26%、94.84%、96.28% 和 97.84%。
{"title":"Deep hybrid model for attack detection in IoT-fog architecture with improved feature set and optimal training","authors":"N. Pokale, Pooja Sharma, Deepak T. Mane","doi":"10.3233/web-230187","DOIUrl":"https://doi.org/10.3233/web-230187","url":null,"abstract":"IoT-Fog computing provides a wide range of services for end-based IoT systems. End IoT devices interface with cloud nodes and fog nodes to manage client tasks. Critical attacks like DDoS and other security risks are more likely to compromise IoT end devices while they are collecting data between the fog and the cloud layer. It’s important to find these network vulnerabilities early. By extracting features and placing the danger in the network, DL is crucial in predicting end-user behavior. However, deep learning cannot be carried out on Internet of Things devices because to their constrained calculation and storage capabilities. In this research, we suggest a three-stage Deep Hybrid Detection Model for Attack Detection in IoT-Fog Architecture. Improved Z-score normalization-based data preparation will be carried out in the initial step. On the basis of preprocessed data, features like IG, raw data, entropy, and enhanced MI are extracted in the second step. The collected characteristics are used as input to hybrid classifiers dubbed optimized Deep Maxout and Deep Belief Network (DBN) in the third step of the process to classify the assaults based on the input dataset. A hybrid optimization model called the BMUJFO (Blue Monkey Updated Jellyfish Optimization) technique is presented for the best Deep Maxout training. Additionally, the suggested model produced higher accuracy, precision, sensitivity, and specificity results, with values of 95.26 percent, 94.84%, 96.28%, and 97.84%, respectively.","PeriodicalId":42775,"journal":{"name":"Web Intelligence","volume":"111 5","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139229127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An empirical study of various detection based techniques with divergent learning’s 基于发散学习的各种检测技术的实证研究
Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-10-27 DOI: 10.3233/web-230103
Bhagyashree Pramod Bendale, Swati Swati Dattatraya Shirke
The prevalence of violence against women and children is concerning, and the initial step is to raise awareness of this issue. Certain forms of detection based techniques are not frequently regarded both socially and culturally permissible. Designing and implementing effective approaches in secondary and supplementary avoidance simultaneously depends on the characterization and assessment. Given the greater incidence of instances and mortalities resulting developing an early detection system is essential. Consequently, violence against women and children is a problem of human health of pandemic proportions. As a result, the focus of this survey is to analyze the existing methods used to identify violence in photos or films. Here, 50 research papers are reviewed and their techniques employed, dataset, evaluation metrics, and publication year are analyzed. The study reviews the potential future research areas by examining the difficulties in identifying violence against women and children in literary works for researchers to overcome in order to produce better results.
对妇女和儿童的暴力行为普遍存在,令人担忧,第一步是提高对这一问题的认识。某些形式的基于检测的技术通常不被社会和文化所允许。同时设计和实施有效的二级和辅助回避方法取决于特征和评估。鉴于发病率和死亡率较高,因此开发早期发现系统至关重要。因此,对妇女和儿童的暴力行为是一个严重影响人类健康的问题。因此,本次调查的重点是分析现有的方法,用于识别照片或电影中的暴力。本文回顾了50篇研究论文,并对其使用的技术、数据集、评估指标和发表年份进行了分析。该研究审查了未来可能的研究领域,审查了在文学作品中识别针对妇女和儿童的暴力行为的困难,供研究人员克服,以取得更好的结果。
{"title":"An empirical study of various detection based techniques with divergent learning’s","authors":"Bhagyashree Pramod Bendale, Swati Swati Dattatraya Shirke","doi":"10.3233/web-230103","DOIUrl":"https://doi.org/10.3233/web-230103","url":null,"abstract":"The prevalence of violence against women and children is concerning, and the initial step is to raise awareness of this issue. Certain forms of detection based techniques are not frequently regarded both socially and culturally permissible. Designing and implementing effective approaches in secondary and supplementary avoidance simultaneously depends on the characterization and assessment. Given the greater incidence of instances and mortalities resulting developing an early detection system is essential. Consequently, violence against women and children is a problem of human health of pandemic proportions. As a result, the focus of this survey is to analyze the existing methods used to identify violence in photos or films. Here, 50 research papers are reviewed and their techniques employed, dataset, evaluation metrics, and publication year are analyzed. The study reviews the potential future research areas by examining the difficulties in identifying violence against women and children in literary works for researchers to overcome in order to produce better results.","PeriodicalId":42775,"journal":{"name":"Web Intelligence","volume":"56 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136311650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Test suite optimization under multi-objective constraints for software fault detection and localization: Hybrid optimization based model 多目标约束下软件故障检测与定位的测试套件优化:基于混合优化的模型
IF 0.3 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-08-28 DOI: 10.3233/web-220131
Adline Freeda R, Selvi Rajendran P
Testing and debugging have been the most significant steps of software development since it is tricky for engineers to create error-free software. Software testing takes place after coding with the goal of finding flaws. If errors are found, debugging would be done to identify the source of the errors so that they may be fixed. Detecting as well as locating defects are thus two essential stages in the creation of software. We have created a unique approach with the following two working phases to generate a minimized test suite that is capable of both detecting and localizing faults. In the initial test suite minimization process, the cases were generated and minimized based on the objectives such as D-score and coverage by the utilization of the proposed Blue Monkey Customized Black Widow (BMCBW) algorithm. After this test suite minimization, the fault validation is done which includes the process of fault detection and localization. For this fault validation, we have utilized an improved Long Short-Term Memory (LSTM). At 90% of the learning rate the accuracy of the presented work is 0.97%, 2.20%, 2.52%, 0.97% and 2.81% is better than the other extant models like AOA, COOT, BES, BMO and BWO methods. The results obtained proved that our Blue Monkey Customized Black Widow Optimization-based fault detection and localization approach can provide superior outcomes.
测试和调试一直是软件开发中最重要的步骤,因为工程师很难创建无错误的软件。软件测试发生在编码之后,目的是发现缺陷。如果发现错误,将进行调试以确定错误的来源,以便对其进行修复。因此,检测和定位缺陷是软件创建中的两个基本阶段。我们使用以下两个工作阶段创建了一种独特的方法,以生成能够检测和定位故障的最小化测试套件。在初始测试套件最小化过程中,使用提出的蓝猴定制黑寡妇(BMCBW)算法,根据D-score和覆盖率等目标生成和最小化用例。在最小化测试套件之后,进行故障验证,包括故障检测和定位过程。对于这种故障验证,我们使用了改进的长短期记忆(LSTM)。在90%的学习率下,所提出的工作的准确率分别为0.97%、2.20%、2.52%、0.97%和2.81%,优于现有的AOA、COOT、BES、BMO和BWO方法。实验结果表明,基于蓝猴定制黑寡妇优化的故障检测与定位方法具有较好的效果。
{"title":"Test suite optimization under multi-objective constraints for software fault detection and localization: Hybrid optimization based model","authors":"Adline Freeda R, Selvi Rajendran P","doi":"10.3233/web-220131","DOIUrl":"https://doi.org/10.3233/web-220131","url":null,"abstract":"Testing and debugging have been the most significant steps of software development since it is tricky for engineers to create error-free software. Software testing takes place after coding with the goal of finding flaws. If errors are found, debugging would be done to identify the source of the errors so that they may be fixed. Detecting as well as locating defects are thus two essential stages in the creation of software. We have created a unique approach with the following two working phases to generate a minimized test suite that is capable of both detecting and localizing faults. In the initial test suite minimization process, the cases were generated and minimized based on the objectives such as D-score and coverage by the utilization of the proposed Blue Monkey Customized Black Widow (BMCBW) algorithm. After this test suite minimization, the fault validation is done which includes the process of fault detection and localization. For this fault validation, we have utilized an improved Long Short-Term Memory (LSTM). At 90% of the learning rate the accuracy of the presented work is 0.97%, 2.20%, 2.52%, 0.97% and 2.81% is better than the other extant models like AOA, COOT, BES, BMO and BWO methods. The results obtained proved that our Blue Monkey Customized Black Widow Optimization-based fault detection and localization approach can provide superior outcomes.","PeriodicalId":42775,"journal":{"name":"Web Intelligence","volume":"6 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73334772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Unique Approach for Performance Analysis of a Blockchain and Cryptocurrency based Carbon Footprint Reduction System 基于区块链和加密货币的碳足迹减少系统性能分析的独特方法
IF 0.3 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-08-11 DOI: 10.3233/web-220049
Ankit Panch, Dr. Om Prakash Sharma
Blockchain technology is commonly used as a replicated and distributed database in different areas. In this paper, a smart home blockchain network connects smart homes through smart devices for reducing carbon footprint and thereby earning bitcoin value in the network. The network is composed of different smart homes interconnected with smart devices. The user makes a transaction request through the network layer and matches the user’s activity with the reward table located at the incentive layer to estimate the bitcoin value. Furthermore, the miner verifies the transaction and sends the bitcoin value to the user, and adds the respective block to the network structure. The optimal parameter used to estimate the bitcoin value is computed using the proposed Improved Invasive Weed Mayfly Optimization (IIWMO) algorithm. The developed method attained higher performance with the metrics, like coins earned, Annual Carbon Reduction (ACR), and fitness as 0.00357BTC, 23.891, and 0.6618 for 200 users. For 200 users the fitness obtained by the proposed method is 14.41%, 16.68%, and 11.68% higher when compared to existing approaches namely, Without optimization, IIWO, and MA, respectively.
区块链技术通常用作不同领域的复制和分布式数据库。在本文中,智能家居区块链网络通过智能设备连接智能家居,以减少碳足迹,从而在网络中获得比特币价值。该网络由不同的智能家居与智能设备相互连接而成。用户通过网络层发出交易请求,并将用户的活动与位于激励层的奖励表进行匹配,从而估算出比特币的价值。此外,矿工验证交易并将比特币价值发送给用户,并将相应的块添加到网络结构中。使用提出的改进入侵杂草蜉蝣优化(IIWMO)算法计算用于估计比特币价值的最优参数。所开发的方法获得了更高的性能,例如获得的硬币,年度碳减少(ACR)和健身指标为0.00357BTC, 23.891和0.6618(200个用户)。对于200个用户,本文方法获得的适应度分别比现有方法(Without optimization、IIWO和MA)高14.41%、16.68%和11.68%。
{"title":"A Unique Approach for Performance Analysis of a Blockchain and Cryptocurrency based Carbon Footprint Reduction System","authors":"Ankit Panch, Dr. Om Prakash Sharma","doi":"10.3233/web-220049","DOIUrl":"https://doi.org/10.3233/web-220049","url":null,"abstract":"Blockchain technology is commonly used as a replicated and distributed database in different areas. In this paper, a smart home blockchain network connects smart homes through smart devices for reducing carbon footprint and thereby earning bitcoin value in the network. The network is composed of different smart homes interconnected with smart devices. The user makes a transaction request through the network layer and matches the user’s activity with the reward table located at the incentive layer to estimate the bitcoin value. Furthermore, the miner verifies the transaction and sends the bitcoin value to the user, and adds the respective block to the network structure. The optimal parameter used to estimate the bitcoin value is computed using the proposed Improved Invasive Weed Mayfly Optimization (IIWMO) algorithm. The developed method attained higher performance with the metrics, like coins earned, Annual Carbon Reduction (ACR), and fitness as 0.00357BTC, 23.891, and 0.6618 for 200 users. For 200 users the fitness obtained by the proposed method is 14.41%, 16.68%, and 11.68% higher when compared to existing approaches namely, Without optimization, IIWO, and MA, respectively.","PeriodicalId":42775,"journal":{"name":"Web Intelligence","volume":"63 1","pages":""},"PeriodicalIF":0.3,"publicationDate":"2023-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89899668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Web Intelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1