首页 > 最新文献

Journal of Intelligent Systems最新文献

英文 中文
Research on the center extraction algorithm of structured light fringe based on an improved gray gravity center method 基于改进灰色重心法的结构光条纹中心提取算法研究
Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0195
Jun Wang, Jingjing Wu, Xiang Jiao, Yue Ding
Abstract In this study, we proposed a fast line-structured light stripe center extraction algorithm based on an improved barycenter algorithm to address the problem that the conventional strip center extraction algorithm cannot meet the requirements of a structured light 3D measurement system in terms of speed and accuracy. First, the algorithm performs pretreatment of the structured light image and obtains the approximate position of the stripe center through skeleton extraction. Next, the normal direction of each pixel on the skeleton is solved using the gray gradient method. Then, the weighted gray center of the gravity method is used to solve the stripe center coordinates along the normal direction. Finally, a smooth strip centerline is fitted using the least squares method. The experimental results show that the improved algorithm achieved significant improvement in speed, sub-pixel level accuracy, and a good structured light stripe center extraction effect, as well as the repeated measurement accuracy of the improved algorithm is within 0.01 mm, and the algorithm has good repeatability.
摘要针对传统条形中心提取算法在速度和精度上无法满足结构光三维测量系统的要求,提出了一种基于改进质心算法的线结构光条形中心快速提取算法。该算法首先对结构光图像进行预处理,通过骨架提取得到条纹中心的近似位置;其次,利用灰度梯度法求解骨架上各像素点的法线方向。然后,利用重力法的加权灰色中心求解沿法线方向的条纹中心坐标;最后,利用最小二乘法拟合出光滑的条形中心线。实验结果表明,改进后的算法在速度、亚像素级精度和良好的结构光条纹中心提取效果上均有显著提高,并且改进算法的重复测量精度在0.01 mm以内,算法具有良好的重复性。
{"title":"Research on the center extraction algorithm of structured light fringe based on an improved gray gravity center method","authors":"Jun Wang, Jingjing Wu, Xiang Jiao, Yue Ding","doi":"10.1515/jisys-2022-0195","DOIUrl":"https://doi.org/10.1515/jisys-2022-0195","url":null,"abstract":"Abstract In this study, we proposed a fast line-structured light stripe center extraction algorithm based on an improved barycenter algorithm to address the problem that the conventional strip center extraction algorithm cannot meet the requirements of a structured light 3D measurement system in terms of speed and accuracy. First, the algorithm performs pretreatment of the structured light image and obtains the approximate position of the stripe center through skeleton extraction. Next, the normal direction of each pixel on the skeleton is solved using the gray gradient method. Then, the weighted gray center of the gravity method is used to solve the stripe center coordinates along the normal direction. Finally, a smooth strip centerline is fitted using the least squares method. The experimental results show that the improved algorithm achieved significant improvement in speed, sub-pixel level accuracy, and a good structured light stripe center extraction effect, as well as the repeated measurement accuracy of the improved algorithm is within 0.01 mm, and the algorithm has good repeatability.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134883378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel deep learning-based brain tumor detection using the Bagging ensemble with K-nearest neighbor 基于深度学习的基于k近邻Bagging集合的脑肿瘤检测
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0206
K. Archana, G. Komarasamy
Abstract In the case of magnetic resonance imaging (MRI) imaging, image processing is crucial. In the medical industry, MRI images are commonly used to analyze and diagnose tumor growth in the body. A number of successful brain tumor identification and classification procedures have been developed by various experts. Existing approaches face a number of obstacles, including detection time, accuracy, and tumor size. Early detection of brain tumors improves options for treatment and patient survival rates. Manually segmenting brain tumors from a significant number of MRI data for brain tumor diagnosis is a tough and time-consuming task. Automatic image segmentation of brain tumors is required. The objective of this study is to evaluate the degree of accuracy and simplify the medical picture segmentation procedure used to identify the type of brain tumor from MRI results. Additionally, this work suggests a novel method for identifying brain malignancies utilizing the Bagging Ensemble with K-Nearest Neighbor (BKNN) in order to raise the KNN’s accuracy and quality rate. For image segmentation, a U-Net architecture is utilized first, followed by a bagging-based k-NN prediction algorithm for classification. The goal of employing U-Net is to improve the accuracy and uniformity of parameter distribution in the layers. Each decision tree is fitted on a little different training dataset during classification, and the bagged decision trees are effective since each tree has minor differences and generates slightly different skilled predictions. The overall classification accuracy was up to 97.7 percent, confirming the efficiency of the suggested strategy for distinguishing normal and pathological tissues from brain MR images; this is greater than the methods that are already in use.
摘要在磁共振成像(MRI)成像中,图像处理是至关重要的。在医疗行业,核磁共振成像通常用于分析和诊断体内肿瘤的生长。许多成功的脑肿瘤鉴定和分类程序已经由不同的专家开发。现有的方法面临许多障碍,包括检测时间、准确性和肿瘤大小。脑肿瘤的早期发现改善了治疗的选择和患者的存活率。从大量的MRI数据中手动分割脑肿瘤用于脑肿瘤诊断是一项艰巨而耗时的任务。需要对脑肿瘤进行自动图像分割。本研究的目的是评估准确性和简化医学图像分割程序,用于从MRI结果中识别脑肿瘤类型。此外,这项工作提出了一种新的方法来识别脑恶性肿瘤利用Bagging集合与k -最近邻(BKNN),以提高KNN的准确性和质量率。对于图像分割,首先使用U-Net架构,然后使用基于bagging的k-NN预测算法进行分类。采用U-Net的目的是提高各层参数分布的准确性和均匀性。在分类过程中,每个决策树都被拟合在一个略有不同的训练数据集上,而袋装决策树是有效的,因为每个树都有微小的差异,并产生略有不同的熟练预测。总体分类准确率高达97.7%,证实了所建议的策略从脑MR图像中区分正常和病理组织的效率;这比已经在使用的方法要大。
{"title":"A novel deep learning-based brain tumor detection using the Bagging ensemble with K-nearest neighbor","authors":"K. Archana, G. Komarasamy","doi":"10.1515/jisys-2022-0206","DOIUrl":"https://doi.org/10.1515/jisys-2022-0206","url":null,"abstract":"Abstract In the case of magnetic resonance imaging (MRI) imaging, image processing is crucial. In the medical industry, MRI images are commonly used to analyze and diagnose tumor growth in the body. A number of successful brain tumor identification and classification procedures have been developed by various experts. Existing approaches face a number of obstacles, including detection time, accuracy, and tumor size. Early detection of brain tumors improves options for treatment and patient survival rates. Manually segmenting brain tumors from a significant number of MRI data for brain tumor diagnosis is a tough and time-consuming task. Automatic image segmentation of brain tumors is required. The objective of this study is to evaluate the degree of accuracy and simplify the medical picture segmentation procedure used to identify the type of brain tumor from MRI results. Additionally, this work suggests a novel method for identifying brain malignancies utilizing the Bagging Ensemble with K-Nearest Neighbor (BKNN) in order to raise the KNN’s accuracy and quality rate. For image segmentation, a U-Net architecture is utilized first, followed by a bagging-based k-NN prediction algorithm for classification. The goal of employing U-Net is to improve the accuracy and uniformity of parameter distribution in the layers. Each decision tree is fitted on a little different training dataset during classification, and the bagged decision trees are effective since each tree has minor differences and generates slightly different skilled predictions. The overall classification accuracy was up to 97.7 percent, confirming the efficiency of the suggested strategy for distinguishing normal and pathological tissues from brain MR images; this is greater than the methods that are already in use.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"7 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86866533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a better similarity algorithm for host-based intrusion detection system 针对基于主机的入侵检测系统,提出一种更好的相似度算法
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0259
Lounis Ouarda, Malika Bourenane, Bouderah Brahim
Abstract An intrusion detection system plays an essential role in system security by discovering and preventing malicious activities. Over the past few years, several research projects on host-based intrusion detection systems (HIDSs) have been carried out utilizing the Australian Defense Force Academy Linux Dataset (ADFA-LD). These HIDS have also been subjected to various algorithm analyses to enhance their detection capability for high accuracy and low false alarms. However, less attention is paid to the actual implementation of real-time HIDS. Our principal objective in this study is to create a performant real-time HIDS. We propose a new model, “Better Similarity Algorithm for Host-based Intrusion Detection System” (BSA-HIDS), using the same dataset ADFA-LD. The proposed model uses three classifications to represent the attack folder according to certain criteria, the entire system call sequence is used. Furthermore, this work uses textual distance and compares five algorithms like Levenshtein, Jaro–Winkler, Jaccard, Hamming, and Dice coefficient, to classify the system call trace as attack or non-attack based on the notions of interclass decoupling and intra-class coupling. The model can detect zero-day attacks because of the threshold definition. The experimental results show a good detection performance in real-time for Levenshtein/Jaro–Winkler algorithms, 99–94% in detection rate, 2–5% in false alarm rate, and 3,300–720 s in running time, respectively.
入侵检测系统通过发现和阻止恶意活动,在系统安全中起着至关重要的作用。在过去几年中,利用澳大利亚国防军学院Linux数据集(ADFA-LD)开展了几个基于主机的入侵检测系统(hids)的研究项目。这些HIDS还进行了各种算法分析,以提高其检测能力,实现高精度和低误报。然而,很少有人关注实时HIDS的实际实施。我们在这项研究中的主要目标是创建一个高性能的实时HIDS。我们提出了一个新的模型,“基于主机的入侵检测系统的更好的相似算法”(BSA-HIDS),使用相同的数据集ADFA-LD。该模型按照一定的标准使用三种分类来表示攻击文件夹,使用整个系统调用序列。此外,这项工作使用文本距离并比较五种算法,如Levenshtein, Jaro-Winkler, Jaccard, Hamming和Dice系数,根据类间解耦和类内耦合的概念将系统调用跟踪分类为攻击或非攻击。由于阈值定义,该模型可以检测到零日攻击。实验结果表明,Levenshtein/ Jaro-Winkler算法具有良好的实时检测性能,检测率为99 ~ 94%,虚警率为2 ~ 5%,运行时间为3300 ~ 720 s。
{"title":"Towards a better similarity algorithm for host-based intrusion detection system","authors":"Lounis Ouarda, Malika Bourenane, Bouderah Brahim","doi":"10.1515/jisys-2022-0259","DOIUrl":"https://doi.org/10.1515/jisys-2022-0259","url":null,"abstract":"Abstract An intrusion detection system plays an essential role in system security by discovering and preventing malicious activities. Over the past few years, several research projects on host-based intrusion detection systems (HIDSs) have been carried out utilizing the Australian Defense Force Academy Linux Dataset (ADFA-LD). These HIDS have also been subjected to various algorithm analyses to enhance their detection capability for high accuracy and low false alarms. However, less attention is paid to the actual implementation of real-time HIDS. Our principal objective in this study is to create a performant real-time HIDS. We propose a new model, “Better Similarity Algorithm for Host-based Intrusion Detection System” (BSA-HIDS), using the same dataset ADFA-LD. The proposed model uses three classifications to represent the attack folder according to certain criteria, the entire system call sequence is used. Furthermore, this work uses textual distance and compares five algorithms like Levenshtein, Jaro–Winkler, Jaccard, Hamming, and Dice coefficient, to classify the system call trace as attack or non-attack based on the notions of interclass decoupling and intra-class coupling. The model can detect zero-day attacks because of the threshold definition. The experimental results show a good detection performance in real-time for Levenshtein/Jaro–Winkler algorithms, 99–94% in detection rate, 2–5% in false alarm rate, and 3,300–720 s in running time, respectively.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"20 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85007870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of adaptive improved DE algorithm based on multi-angle search rotation crossover strategy in multi-circuit testing optimization 基于多角度搜索旋转交叉策略的自适应改进DE算法在多电路测试优化中的应用
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0269
Wenchang Wu
Abstract This study based on the standard differential evolution (DE) algorithm was carried out to address the issues of control parameter imprinting, mutation process, and crossover process in the standard DE algorithm as well as the issue of multidimensional circuit testing optimization. A rotation control vector was introduced to expand the search range in the poor strategy to the circumference range of the individual and the parent target individual, and a rotation crossover operator and a binomial poor operator were combined. Finally, an improved adaptive DE algorithm based on a multi-angle search rotation crossover strategy was obtained. The research will improve the DE algorithm to optimize the testing of multidimensional circuits. It can be noted that the improved average precision value is 0.9919 when comparing the precision recall curves of the DE algorithm before and after the change, demonstrating a significant improvement in accuracy and stability. The fitness difference of the 30-dimensional problem is discovered to be between 0.25 × 103 and 0.5 × 103 by comparing the box graphs of the 30-dimensional problem with that of the 50-dimensional problem. On the 50-dimensional problem, when calculating the F4–F10 function, the fitness difference of the improved DE algorithm is 0.2 × 104–0.4 × 104. In summary, the improved DE algorithm proposed in this study compensates for the shortcomings of traditional algorithms in complex problem calculations and has also achieved significant optimization results in multidimensional circuit testing.
摘要本研究基于标准差分进化(DE)算法,针对标准差分进化算法中的控制参数印记、突变过程、交叉过程以及多维电路测试优化问题进行研究。引入旋转控制向量将穷策略的搜索范围扩展到个体和母目标个体的周长范围,并结合旋转交叉算子和二项式穷算子。最后,给出了一种基于多角度搜索旋转交叉策略的改进自适应DE算法。该研究将改进DE算法以优化多维电路的测试。可以注意到,对比修改前后DE算法的查准率召回曲线,改进后的平均查准率为0.9919,准确率和稳定性都有了显著提高。通过对比30维问题的盒图和50维问题的盒图,发现30维问题的适应度差在0.25 × 103和0.5 × 103之间。在50维问题上,计算F4-F10函数时,改进DE算法的适应度差为0.2 × 104 - 0.4 × 104。综上所述,本文提出的改进DE算法弥补了传统算法在复杂问题计算中的不足,在多维电路测试中也取得了显著的优化效果。
{"title":"Application of adaptive improved DE algorithm based on multi-angle search rotation crossover strategy in multi-circuit testing optimization","authors":"Wenchang Wu","doi":"10.1515/jisys-2022-0269","DOIUrl":"https://doi.org/10.1515/jisys-2022-0269","url":null,"abstract":"Abstract This study based on the standard differential evolution (DE) algorithm was carried out to address the issues of control parameter imprinting, mutation process, and crossover process in the standard DE algorithm as well as the issue of multidimensional circuit testing optimization. A rotation control vector was introduced to expand the search range in the poor strategy to the circumference range of the individual and the parent target individual, and a rotation crossover operator and a binomial poor operator were combined. Finally, an improved adaptive DE algorithm based on a multi-angle search rotation crossover strategy was obtained. The research will improve the DE algorithm to optimize the testing of multidimensional circuits. It can be noted that the improved average precision value is 0.9919 when comparing the precision recall curves of the DE algorithm before and after the change, demonstrating a significant improvement in accuracy and stability. The fitness difference of the 30-dimensional problem is discovered to be between 0.25 × 103 and 0.5 × 103 by comparing the box graphs of the 30-dimensional problem with that of the 50-dimensional problem. On the 50-dimensional problem, when calculating the F4–F10 function, the fitness difference of the improved DE algorithm is 0.2 × 104–0.4 × 104. In summary, the improved DE algorithm proposed in this study compensates for the shortcomings of traditional algorithms in complex problem calculations and has also achieved significant optimization results in multidimensional circuit testing.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"11 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81469329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Salp swarm and gray wolf optimizer for improving the efficiency of power supply network in radial distribution systems 基于Salp群和灰狼优化算法的径向配电网效率优化研究
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0221
I. Salman, K. M. Saffer, Hayder H. Safi, S. Mostafa, Bashar Ahmad Khalaf
Abstract The efficiency of distribution networks is hugely affected by active and reactive power flows in distribution electric power systems. Currently, distributed generators (DGs) of energy are extensively applied to minimize power loss and improve voltage deviancies on power distribution systems. The best position and volume of DGs produce better power outcomes. This work prepares a new hybrid SSA–GWO metaheuristic optimization algorithm that combines the salp swarm algorithm (SSA) and the gray wolf optimizer (GWO) algorithm. The SSA–GWO algorithm ensures generating the best size and site of one and multi-DGs on the radial distribution network to decrease real power losses (RPL) (kW) on lines and resolve voltage deviancies. Our novel algorithm is executed on IEEE 123-bus radial distribution test systems. The results confirm the success of the suggested hybrid SSA–GWO algorithm compared with implementing the SSA and GWO individually. Through the proposed SSA–GWO algorithm, the study decreases the RPL and improves the voltage profile on distribution networks with multiple DGs units.
配电网有功潮流和无功潮流对配电网的效率有很大影响。目前,分布式能源发电机(dg)被广泛应用于配电系统中,以减小电力损耗和改善电压偏差。dg的最佳位置和体积可以产生更好的功率输出。本文提出了一种新的混合SSA - GWO元启发式优化算法,该算法将salp swarm算法(SSA)和灰狼优化器(GWO)算法相结合。SSA-GWO算法确保在径向配电网上生成一个和多个dg的最佳尺寸和位置,以降低线路上的实际功率损耗(RPL) (kW)并解决电压偏差。该算法已在IEEE 123总线径向配电测试系统上运行。与单独实现SSA和GWO相比,结果证实了所提出的SSA - GWO混合算法的成功。通过提出的SSA-GWO算法,降低了RPL,改善了多dg配电网的电压分布。
{"title":"Salp swarm and gray wolf optimizer for improving the efficiency of power supply network in radial distribution systems","authors":"I. Salman, K. M. Saffer, Hayder H. Safi, S. Mostafa, Bashar Ahmad Khalaf","doi":"10.1515/jisys-2022-0221","DOIUrl":"https://doi.org/10.1515/jisys-2022-0221","url":null,"abstract":"Abstract The efficiency of distribution networks is hugely affected by active and reactive power flows in distribution electric power systems. Currently, distributed generators (DGs) of energy are extensively applied to minimize power loss and improve voltage deviancies on power distribution systems. The best position and volume of DGs produce better power outcomes. This work prepares a new hybrid SSA–GWO metaheuristic optimization algorithm that combines the salp swarm algorithm (SSA) and the gray wolf optimizer (GWO) algorithm. The SSA–GWO algorithm ensures generating the best size and site of one and multi-DGs on the radial distribution network to decrease real power losses (RPL) (kW) on lines and resolve voltage deviancies. Our novel algorithm is executed on IEEE 123-bus radial distribution test systems. The results confirm the success of the suggested hybrid SSA–GWO algorithm compared with implementing the SSA and GWO individually. Through the proposed SSA–GWO algorithm, the study decreases the RPL and improves the voltage profile on distribution networks with multiple DGs units.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"8 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78754394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anomaly detection for maritime navigation based on probability density function of error of reconstruction 基于重构误差概率密度函数的海上导航异常检测
Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0270
Zahra Sadeghi, Stan Matwin
Abstract Anomaly detection is a fundamental problem in data science and is one of the highly studied topics in machine learning. This problem has been addressed in different contexts and domains. This article investigates anomalous data within time series data in the maritime sector. Since there is no annotated dataset for this purpose, in this study, we apply an unsupervised approach. Our method benefits from the unsupervised learning feature of autoencoders. We utilize the reconstruction error as a signal for anomaly detection. For this purpose, we estimate the probability density function of the reconstruction error and find different levels of abnormality based on statistical attributes of the density of error. Our results demonstrate the effectiveness of this approach for localizing irregular patterns in the trajectory of vessel movements.
异常检测是数据科学的一个基本问题,也是机器学习领域研究的热点之一。这个问题已经在不同的上下文中和领域得到了解决。本文研究了海事部门时间序列数据中的异常数据。由于没有用于此目的的注释数据集,因此在本研究中,我们采用无监督方法。我们的方法得益于自编码器的无监督学习特性。我们利用重构误差作为异常检测的信号。为此,我们估计重构误差的概率密度函数,并根据误差密度的统计属性找到不同程度的异常。我们的结果证明了这种方法在船舶运动轨迹中定位不规则模式的有效性。
{"title":"Anomaly detection for maritime navigation based on probability density function of error of reconstruction","authors":"Zahra Sadeghi, Stan Matwin","doi":"10.1515/jisys-2022-0270","DOIUrl":"https://doi.org/10.1515/jisys-2022-0270","url":null,"abstract":"Abstract Anomaly detection is a fundamental problem in data science and is one of the highly studied topics in machine learning. This problem has been addressed in different contexts and domains. This article investigates anomalous data within time series data in the maritime sector. Since there is no annotated dataset for this purpose, in this study, we apply an unsupervised approach. Our method benefits from the unsupervised learning feature of autoencoders. We utilize the reconstruction error as a signal for anomaly detection. For this purpose, we estimate the probability density function of the reconstruction error and find different levels of abnormality based on statistical attributes of the density of error. Our results demonstrate the effectiveness of this approach for localizing irregular patterns in the trajectory of vessel movements.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135710303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-crop disease identification approach based on residual attention learning 基于剩余注意学习的多作物病害识别方法
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0248
Kirti, N. Rajpal
Abstract In this work, a technique is proposed to identify the diseases that occur in plants. The system is based on a combination of residual network and attention learning. The work focuses on disease identification from the images of four different plant types by analyzing leaf images of the plants. A total of four datasets are used for the work. The system incorporates attention-aware features computed by the Residual Attention Network (Res-ATTEN). The base of the network is ResNet-18 architecture. Integrating attention learning in the residual network helps improve the system's overall accuracy. Various residual attention units are combined to create a single architecture. Unlike the traditional attention network architectures, which focus only on a single type of attention, the system uses a mixed type of attention learning, i.e., a combination of spatial and channel attention. Our technique achieves state-of-the-art performance with the highest accuracy of 99%. The results show that the proposed system has performed well for both purposes and notably outperformed the traditional systems.
摘要本文提出了一种植物病害识别技术。该系统基于残差网络和注意学习的结合。通过对四种不同类型植物叶片图像的分析,对病害进行了识别。这项工作总共使用了四个数据集。该系统结合了剩余注意网络(res - aten)计算的注意感知特征。网络的基础是ResNet-18架构。残差网络中集成注意力学习有助于提高系统的整体准确率。各种剩余的注意力单元被组合起来创建一个单一的体系结构。与传统的注意力网络架构只关注单一类型的注意力不同,该系统使用混合类型的注意力学习,即空间和通道注意力的结合。我们的技术达到了最先进的性能,准确率高达99%。结果表明,所提出的系统在两方面都表现良好,并且明显优于传统系统。
{"title":"A multi-crop disease identification approach based on residual attention learning","authors":"Kirti, N. Rajpal","doi":"10.1515/jisys-2022-0248","DOIUrl":"https://doi.org/10.1515/jisys-2022-0248","url":null,"abstract":"Abstract In this work, a technique is proposed to identify the diseases that occur in plants. The system is based on a combination of residual network and attention learning. The work focuses on disease identification from the images of four different plant types by analyzing leaf images of the plants. A total of four datasets are used for the work. The system incorporates attention-aware features computed by the Residual Attention Network (Res-ATTEN). The base of the network is ResNet-18 architecture. Integrating attention learning in the residual network helps improve the system's overall accuracy. Various residual attention units are combined to create a single architecture. Unlike the traditional attention network architectures, which focus only on a single type of attention, the system uses a mixed type of attention learning, i.e., a combination of spatial and channel attention. Our technique achieves state-of-the-art performance with the highest accuracy of 99%. The results show that the proposed system has performed well for both purposes and notably outperformed the traditional systems.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"7 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84122450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent control system for industrial robots based on multi-source data fusion 基于多源数据融合的工业机器人智能控制系统
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0286
Yang Zhang
Abstract Industrialization has advanced quickly, bringing intelligent production and manufacturing into people’s daily lives, but it has also created a number of issues with the ability of intelligent control systems for industrial robots. As a result, a study has been conducted on the use of multi-source data fusion methods in the mechanical industry. First, the research analyzes and discusses the existing research at home and abroad. Then, a robot intelligent control system based on multi-source fusion method is proposed, which combines multi-source data fusion with principal component analysis to better fuse data of multiple control periods; In the process, the experimental results are dynamically evaluated, and the performance of the proposed method is compared with other fusion methods. The results of the study showed that the confidence values and recognition correctness of the intelligent control system under the proposed method were superior compared to the Yu, Murphy, and Deng methods. Applying the method to the comparison of real-time and historical data values, it is found that the predicted data under the proposed method fits better with the actual data values, and the fit can be as high as 0.9945. The dynamic evaluation analysis of single and multi-factor in the simulation stage demonstrates that the control ability in the training samples of 0–100 is often better than the actual results, and the best evaluation results may be obtained at the sample size of 50 per batch. The aforementioned findings demonstrated that the multi-data fusion method that was suggested had a high degree of viability and accuracy for the intelligent control system of industrial robots and could offer a fresh line of enquiry for the advancement and development of the mechanical industrialization field.
摘要工业化发展迅速,将智能生产和制造带入人们的日常生活,但同时也给工业机器人智能控制系统的能力带来了一些问题。因此,对多源数据融合方法在机械工业中的应用进行了研究。首先,本研究对国内外已有的研究进行了分析和探讨。然后,提出了一种基于多源融合方法的机器人智能控制系统,将多源数据融合与主成分分析相结合,更好地融合了多个控制周期的数据;在此过程中,对实验结果进行了动态评价,并与其他融合方法进行了性能比较。研究结果表明,与Yu、Murphy和Deng方法相比,该方法下的智能控制系统的置信度值和识别正确性都有所提高。将该方法应用于实时数据值与历史数据值的比较,发现该方法下的预测数据与实际数据值拟合较好,拟合度可高达0.9945。仿真阶段单因素和多因素的动态评价分析表明,0-100个训练样本中的控制能力往往优于实际结果,每批50个样本量时可能获得最佳评价结果。上述研究结果表明,所提出的多数据融合方法对于工业机器人智能控制系统具有较高的可行性和准确性,可以为机械工业化领域的进步和发展提供新的思路。
{"title":"Intelligent control system for industrial robots based on multi-source data fusion","authors":"Yang Zhang","doi":"10.1515/jisys-2022-0286","DOIUrl":"https://doi.org/10.1515/jisys-2022-0286","url":null,"abstract":"Abstract Industrialization has advanced quickly, bringing intelligent production and manufacturing into people’s daily lives, but it has also created a number of issues with the ability of intelligent control systems for industrial robots. As a result, a study has been conducted on the use of multi-source data fusion methods in the mechanical industry. First, the research analyzes and discusses the existing research at home and abroad. Then, a robot intelligent control system based on multi-source fusion method is proposed, which combines multi-source data fusion with principal component analysis to better fuse data of multiple control periods; In the process, the experimental results are dynamically evaluated, and the performance of the proposed method is compared with other fusion methods. The results of the study showed that the confidence values and recognition correctness of the intelligent control system under the proposed method were superior compared to the Yu, Murphy, and Deng methods. Applying the method to the comparison of real-time and historical data values, it is found that the predicted data under the proposed method fits better with the actual data values, and the fit can be as high as 0.9945. The dynamic evaluation analysis of single and multi-factor in the simulation stage demonstrates that the control ability in the training samples of 0–100 is often better than the actual results, and the best evaluation results may be obtained at the sample size of 50 per batch. The aforementioned findings demonstrated that the multi-data fusion method that was suggested had a high degree of viability and accuracy for the intelligent control system of industrial robots and could offer a fresh line of enquiry for the advancement and development of the mechanical industrialization field.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"22 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74451422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning for content-based image retrieval in FHE algorithms FHE算法中基于内容的图像检索的深度学习
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0222
Sura Mahmood Abdullah, Mustafa Musa Jaber
Abstract Content-based image retrieval (CBIR) is a technique used to retrieve image from an image database. However, the CBIR process suffers from less accuracy to retrieve many images from an extensive image database and prove the privacy of images. The aim of this article is to address the issues of accuracy utilizing deep learning techniques such as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon–Kim–Kim–Song (CKKS). The system has been proposed, namely RCNN_CKKS, which includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.87% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.
摘要基于内容的图像检索(CBIR)是一种从图像数据库中检索图像的技术。然而,在从庞大的图像数据库中检索大量图像和证明图像隐私时,CBIR过程的准确性较低。本文的目的是利用CNN方法等深度学习技术解决准确性问题。此外,它使用Cheon-Kim-Kim-Song (CKKS)的全同态加密方法为图像提供必要的隐私。提出了RCNN_CKKS系统,该系统包括两个部分。第一部分(离线处理)基于卷积神经网络(CNN)的平坦层提取自动化高级特征,然后将这些特征存储在新的数据集中。在第二部分(在线处理)中,客户端将加密后的图像发送给服务器,服务器依赖训练好的CNN模型提取发送图像的特征。接下来,将提取的特征与存储的特征进行比较,使用汉明距离法检索所有相似的图像。最后,服务器加密所有检索到的图像并将它们发送给客户机。对普通图像的深度学习分类率为97.87%,对检索图像的深度学习分类率为98.94%。同时,使用NIST测试来检查CKKS应用于加拿大高级研究所(CIFAR-10)数据集时的安全性。通过这些结果,研究人员得出结论,深度学习是一种有效的图像检索方法,CKKS方法适用于图像隐私保护。
{"title":"Deep learning for content-based image retrieval in FHE algorithms","authors":"Sura Mahmood Abdullah, Mustafa Musa Jaber","doi":"10.1515/jisys-2022-0222","DOIUrl":"https://doi.org/10.1515/jisys-2022-0222","url":null,"abstract":"Abstract Content-based image retrieval (CBIR) is a technique used to retrieve image from an image database. However, the CBIR process suffers from less accuracy to retrieve many images from an extensive image database and prove the privacy of images. The aim of this article is to address the issues of accuracy utilizing deep learning techniques such as the CNN method. Also, it provides the necessary privacy for images using fully homomorphic encryption methods by Cheon–Kim–Kim–Song (CKKS). The system has been proposed, namely RCNN_CKKS, which includes two parts. The first part (offline processing) extracts automated high-level features based on a flatting layer in a convolutional neural network (CNN) and then stores these features in a new dataset. In the second part (online processing), the client sends the encrypted image to the server, which depends on the CNN model trained to extract features of the sent image. Next, the extracted features are compared with the stored features using a Hamming distance method to retrieve all similar images. Finally, the server encrypts all retrieved images and sends them to the client. Deep-learning results on plain images were 97.87% for classification and 98.94% for retriever images. At the same time, the NIST test was used to check the security of CKKS when applied to Canadian Institute for Advanced Research (CIFAR-10) dataset. Through these results, researchers conclude that deep learning is an effective method for image retrieval and that a CKKS method is appropriate for image privacy protection.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"21 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81845440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks 物联网网络分布式拒绝服务攻击检测方法中的深度学习
IF 3 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-01 DOI: 10.1515/jisys-2022-0155
Firas Mohammed Aswad, Ali Ahmed, N. A. M. Alhammadi, Bashar Ahmad Khalaf, S. Mostafa
Abstract With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. The RNN, CNN, LSTM, and CNN-BiLSTM are implemented and tested to determine the most effective model against DDoS attacks that can accurately detect and distinguish DDoS from legitimate traffic. The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. The performance of the models is quite effective as they obtain an accuracy rate of around 99.00%, except for the CNN model, which achieves an accuracy of 98.82%. The CNN-BiLSTM achieves the best accuracy of 99.76% and precision of 98.90%.
随着现代信息系统技术的快速发展,物联网(IoT)在许多方面对人们的日常生活变得越来越有价值和重要。物联网应用现在比以前更受欢迎,这是由于许多可以作为物联网推动者的小工具的可用性,包括智能手表、智能手机、安全摄像头和智能传感器。然而,物联网设备的不安全特性导致了一些困难,其中之一是分布式拒绝服务(DDoS)攻击。物联网系统由于其不声誉特性(如物联网设备之间的动态通信)而存在一些安全限制。动态通信是由于这些设备有限的资源造成的,例如它们的数据存储和处理单元。最近,人们尝试开发智能模型来保护物联网网络免受DDoS攻击。目前正在进行的主要研究问题是开发一种能够保护网络免受DDoS攻击的模型,该模型对各种类型的DDoS很敏感,并且可以识别合法流量以避免误报。随后,本研究提出结合递归神经网络(RNN)、长短期记忆(LSTM)-RNN和卷积神经网络(CNN)三种深度学习算法,构建双向CNN- bilstm DDoS检测模型。通过对RNN、CNN、LSTM、CNN- bilstm的实现和测试,确定最有效的DDoS攻击模型,能够准确地检测和区分DDoS和合法流量。使用入侵检测评估数据集(CICIDS2017)提供更真实的检测。CICIDS2017数据集包括良性和最新的典型攻击示例,与数据包捕获的真实数据密切匹配。使用混淆矩阵对四个常用标准进行测试和评估:准确性、精度、召回率和F-measure。除了CNN模型的准确率为98.82%外,其他模型的性能都非常有效,准确率在99.00%左右。CNN-BiLSTM的准确率为99.76%,精密度为98.90%。
{"title":"Deep learning in distributed denial-of-service attacks detection method for Internet of Things networks","authors":"Firas Mohammed Aswad, Ali Ahmed, N. A. M. Alhammadi, Bashar Ahmad Khalaf, S. Mostafa","doi":"10.1515/jisys-2022-0155","DOIUrl":"https://doi.org/10.1515/jisys-2022-0155","url":null,"abstract":"Abstract With the rapid growth of informatics systems’ technology in this modern age, the Internet of Things (IoT) has become more valuable and vital to everyday life in many ways. IoT applications are now more popular than they used to be due to the availability of many gadgets that work as IoT enablers, including smartwatches, smartphones, security cameras, and smart sensors. However, the insecure nature of IoT devices has led to several difficulties, one of which is distributed denial-of-service (DDoS) attacks. IoT systems have several security limitations due to their disreputability characteristics, like dynamic communication between IoT devices. The dynamic communications resulted from the limited resources of these devices, such as their data storage and processing units. Recently, many attempts have been made to develop intelligent models to protect IoT networks against DDoS attacks. The main ongoing research issue is developing a model capable of protecting the network from DDoS attacks that is sensitive to various classes of DDoS and can recognize legitimate traffic to avoid false alarms. Subsequently, this study proposes combining three deep learning algorithms, namely recurrent neural network (RNN), long short-term memory (LSTM)-RNN, and convolutional neural network (CNN), to build a bidirectional CNN-BiLSTM DDoS detection model. The RNN, CNN, LSTM, and CNN-BiLSTM are implemented and tested to determine the most effective model against DDoS attacks that can accurately detect and distinguish DDoS from legitimate traffic. The intrusion detection evaluation dataset (CICIDS2017) is used to provide more realistic detection. The CICIDS2017 dataset includes benign and up-to-date examples of typical attacks, closely matching real-world data of Packet Capture. The four models are tested and assessed using Confusion Metrix against four commonly used criteria: accuracy, precision, recall, and F-measure. The performance of the models is quite effective as they obtain an accuracy rate of around 99.00%, except for the CNN model, which achieves an accuracy of 98.82%. The CNN-BiLSTM achieves the best accuracy of 99.76% and precision of 98.90%.","PeriodicalId":46139,"journal":{"name":"Journal of Intelligent Systems","volume":"30 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82967479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Journal of Intelligent Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1