首页 > 最新文献

Computers最新文献

英文 中文
Detecting Breast Tumors in Tomosynthesis Images Utilizing Deep Learning-Based Dynamic Ensemble Approach 基于深度学习的动态集成方法在断层合成图像中检测乳腺肿瘤
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-30 DOI: 10.3390/computers12110220
Loay Hassan, Adel Saleh, Vivek Kumar Singh, Domenec Puig, Mohamed Abdel-Nasser
Digital breast tomosynthesis (DBT) stands out as a highly robust screening technique capable of enhancing the rate at which breast cancer is detected. It also addresses certain limitations that are inherent to mammography. Nonetheless, the process of manually examining numerous DBT slices per case is notably time-intensive. To address this, computer-aided detection (CAD) systems based on deep learning have emerged, aiming to automatically identify breast tumors within DBT images. However, the current CAD systems are hindered by a variety of challenges. These challenges encompass the diversity observed in breast density, as well as the varied shapes, sizes, and locations of breast lesions. To counteract these limitations, we propose a novel method for detecting breast tumors within DBT images. This method relies on a potent dynamic ensemble technique, along with robust individual breast tumor detectors (IBTDs). The proposed dynamic ensemble technique utilizes a deep neural network to select the optimal IBTD for detecting breast tumors, based on the characteristics of the input DBT image. The developed individual breast tumor detectors hinge on resilient deep-learning architectures and inventive data augmentation methods. This study introduces two data augmentation strategies, namely channel replication and channel concatenation. These data augmentation methods are employed to surmount the scarcity of available data and to replicate diverse scenarios encompassing variations in breast density, as well as the shapes, sizes, and locations of breast lesions. This enhances the detection capabilities of each IBTD. The effectiveness of the proposed method is evaluated against two state-of-the-art ensemble techniques, namely non-maximum suppression (NMS) and weighted boxes fusion (WBF), finding that the proposed ensemble method achieves the best results with an F1-score of 84.96% when tested on a publicly accessible DBT dataset. When evaluated across different modalities such as breast mammography, the proposed method consistently attains superior tumor detection outcomes.
数字乳腺断层合成(DBT)作为一种高度稳健的筛查技术脱颖而出,能够提高乳腺癌的检出率。它还解决了乳房x光检查固有的某些局限性。尽管如此,手动检查每个案例的大量DBT切片的过程非常耗时。为了解决这个问题,基于深度学习的计算机辅助检测(CAD)系统已经出现,旨在自动识别DBT图像中的乳腺肿瘤。然而,当前的CAD系统受到各种挑战的阻碍。这些挑战包括观察到的乳腺密度的多样性,以及乳腺病变的不同形状、大小和位置。为了克服这些限制,我们提出了一种新的方法来检测乳腺肿瘤在DBT图像。该方法依赖于一种强大的动态集成技术,以及强大的个体乳腺肿瘤检测器(ibtd)。提出的动态集成技术利用深度神经网络根据输入DBT图像的特征选择最优的IBTD来检测乳腺肿瘤。开发的个体乳房肿瘤检测器依赖于弹性深度学习架构和创新的数据增强方法。本文介绍了两种数据扩充策略,即信道复制和信道拼接。这些数据增强方法被用来克服可用数据的稀缺性,并复制不同的场景,包括乳房密度的变化,以及乳房病变的形状、大小和位置。这增强了每个IBTD的检测能力。通过对两种最先进的集成技术(即非最大抑制(NMS)和加权盒融合(WBF))的有效性进行评估,发现在可公开访问的DBT数据集上测试时,所提出的集成方法获得了最佳结果,f1得分为84.96%。当评估不同的模式,如乳房x光检查,所提出的方法始终达到优越的肿瘤检测结果。
{"title":"Detecting Breast Tumors in Tomosynthesis Images Utilizing Deep Learning-Based Dynamic Ensemble Approach","authors":"Loay Hassan, Adel Saleh, Vivek Kumar Singh, Domenec Puig, Mohamed Abdel-Nasser","doi":"10.3390/computers12110220","DOIUrl":"https://doi.org/10.3390/computers12110220","url":null,"abstract":"Digital breast tomosynthesis (DBT) stands out as a highly robust screening technique capable of enhancing the rate at which breast cancer is detected. It also addresses certain limitations that are inherent to mammography. Nonetheless, the process of manually examining numerous DBT slices per case is notably time-intensive. To address this, computer-aided detection (CAD) systems based on deep learning have emerged, aiming to automatically identify breast tumors within DBT images. However, the current CAD systems are hindered by a variety of challenges. These challenges encompass the diversity observed in breast density, as well as the varied shapes, sizes, and locations of breast lesions. To counteract these limitations, we propose a novel method for detecting breast tumors within DBT images. This method relies on a potent dynamic ensemble technique, along with robust individual breast tumor detectors (IBTDs). The proposed dynamic ensemble technique utilizes a deep neural network to select the optimal IBTD for detecting breast tumors, based on the characteristics of the input DBT image. The developed individual breast tumor detectors hinge on resilient deep-learning architectures and inventive data augmentation methods. This study introduces two data augmentation strategies, namely channel replication and channel concatenation. These data augmentation methods are employed to surmount the scarcity of available data and to replicate diverse scenarios encompassing variations in breast density, as well as the shapes, sizes, and locations of breast lesions. This enhances the detection capabilities of each IBTD. The effectiveness of the proposed method is evaluated against two state-of-the-art ensemble techniques, namely non-maximum suppression (NMS) and weighted boxes fusion (WBF), finding that the proposed ensemble method achieves the best results with an F1-score of 84.96% when tested on a publicly accessible DBT dataset. When evaluated across different modalities such as breast mammography, the proposed method consistently attains superior tumor detection outcomes.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136023327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BigDaM: Efficient Big Data Management and Interoperability Middleware for Seaports as Critical Infrastructures BigDaM:港口作为关键基础设施的高效大数据管理和互操作性中间件
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-27 DOI: 10.3390/computers12110218
Anastasios Nikolakopoulos, Matilde Julian Segui, Andreu Belsa Pellicer, Michalis Kefalogiannis, Christos-Antonios Gizelis, Achilleas Marinakis, Konstantinos Nestorakis, Theodora Varvarigou
Over the last few years, the European Union (EU) has placed significant emphasis on the interoperability of critical infrastructures (CIs). One of the main CI transportation infrastructures are ports. The control systems managing such infrastructures are constantly evolving and handle diverse sets of people, data, and processes. Additionally, interdependencies among different infrastructures can lead to discrepancies in data models that propagate and intensify across interconnected systems. This article introduces “BigDaM”, a Big Data Management framework for critical infrastructures. It is a cutting-edge data model that adheres to the latest technological standards and aims to consolidate APIs and services within highly complex CI infrastructures. Our approach takes a bottom-up perspective, treating each service interconnection as an autonomous entity that must align with the proposed common vocabulary and data model. By injecting strict guidelines into the service/component development’s lifecycle, we explicitly promote interoperability among the services within critical infrastructure ecosystems. This approach facilitates the exchange and reuse of data from a shared repository among developers, small and medium-sized enterprises (SMEs), and large vendors. Business challenges have also been taken into account, in order to link the generated data assets of CIs with the business world. The complete framework has been tested in the main EU ports, part of the transportation sector of CIs. Performance evaluation and the aforementioned testing is also being analyzed, highlighting the capabilities of the proposed approach.
在过去的几年中,欧盟(EU)非常重视关键基础设施(ci)的互操作性。主要的CI运输基础设施之一是港口。管理这些基础设施的控制系统不断发展,并处理不同的人员、数据和流程。此外,不同基础设施之间的相互依赖性可能导致数据模型的差异,这些差异会在相互连接的系统之间传播和加强。本文介绍了一种用于关键基础设施的大数据管理框架“BigDaM”。它是一种尖端的数据模型,遵循最新的技术标准,旨在将api和服务整合到高度复杂的CI基础设施中。我们的方法采用自底向上的视角,将每个服务互连视为必须与建议的公共词汇表和数据模型保持一致的自治实体。通过在服务/组件开发的生命周期中注入严格的指导方针,我们明确地促进了关键基础设施生态系统中服务之间的互操作性。这种方法有助于在开发人员、中小型企业和大型供应商之间交换和重用来自共享存储库的数据。为了将ci生成的数据资产与商业世界联系起来,还考虑了业务挑战。完整的框架已经在欧盟主要港口进行了测试,这些港口是独联体运输部门的一部分。还对性能评估和前面提到的测试进行了分析,突出了所建议方法的能力。
{"title":"BigDaM: Efficient Big Data Management and Interoperability Middleware for Seaports as Critical Infrastructures","authors":"Anastasios Nikolakopoulos, Matilde Julian Segui, Andreu Belsa Pellicer, Michalis Kefalogiannis, Christos-Antonios Gizelis, Achilleas Marinakis, Konstantinos Nestorakis, Theodora Varvarigou","doi":"10.3390/computers12110218","DOIUrl":"https://doi.org/10.3390/computers12110218","url":null,"abstract":"Over the last few years, the European Union (EU) has placed significant emphasis on the interoperability of critical infrastructures (CIs). One of the main CI transportation infrastructures are ports. The control systems managing such infrastructures are constantly evolving and handle diverse sets of people, data, and processes. Additionally, interdependencies among different infrastructures can lead to discrepancies in data models that propagate and intensify across interconnected systems. This article introduces “BigDaM”, a Big Data Management framework for critical infrastructures. It is a cutting-edge data model that adheres to the latest technological standards and aims to consolidate APIs and services within highly complex CI infrastructures. Our approach takes a bottom-up perspective, treating each service interconnection as an autonomous entity that must align with the proposed common vocabulary and data model. By injecting strict guidelines into the service/component development’s lifecycle, we explicitly promote interoperability among the services within critical infrastructure ecosystems. This approach facilitates the exchange and reuse of data from a shared repository among developers, small and medium-sized enterprises (SMEs), and large vendors. Business challenges have also been taken into account, in order to link the generated data assets of CIs with the business world. The complete framework has been tested in the main EU ports, part of the transportation sector of CIs. Performance evaluation and the aforementioned testing is also being analyzed, highlighting the capabilities of the proposed approach.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136234652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CNN-GRU Approach to the Accurate Prediction of Batteries’ Remaining Useful Life from Charging Profiles 基于充电曲线准确预测电池剩余使用寿命的CNN-GRU方法
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-27 DOI: 10.3390/computers12110219
Sadiqa Jafari, Yung-Cheol Byun
Predicting the remaining useful life (RUL) is a pivotal step in ensuring the reliability of lithium-ion batteries (LIBs). In order to enhance the precision and stability of battery RUL prediction, this study introduces an innovative hybrid deep learning model that seamlessly integrates convolutional neural network (CNN) and gated recurrent unit (GRU) architectures. Our primary goal is to significantly improve the accuracy of RUL predictions for LIBs. Our model excels in its predictive capabilities by skillfully extracting intricate features from a diverse array of data sources, including voltage (V), current (I), temperature (T), and capacity. Within this novel architectural design, parallel CNN layers are meticulously crafted to process each input feature individually. This approach enables the extraction of highly pertinent information from multi-channel charging profiles. We subjected our model to rigorous evaluations across three distinct scenarios to validate its effectiveness. When compared to LSTM, GRU, and CNN-LSTM models, our CNN-GRU model showcases a remarkable reduction in root mean square error, mean square error, mean absolute error, and mean absolute percentage error. These results affirm the superior predictive capabilities of our CNN-GRU model, which effectively harnesses the strengths of both CNNs and GRU networks to achieve superior prediction accuracy. This study draws upon NASA data to underscore the outstanding predictive performance of the CNN-GRU model in estimating the RUL of LIBs.
预测剩余使用寿命(RUL)是确保锂离子电池(lib)可靠性的关键步骤。为了提高电池RUL预测的精度和稳定性,本研究引入了一种创新的混合深度学习模型,该模型无缝集成了卷积神经网络(CNN)和门控循环单元(GRU)架构。我们的主要目标是显著提高lib的RUL预测的准确性。我们的模型通过巧妙地从各种数据源中提取复杂的特征,包括电压(V)、电流(I)、温度(T)和容量,在预测能力方面表现出色。在这种新颖的架构设计中,并行的CNN层被精心制作,以单独处理每个输入特征。这种方法可以从多通道充电配置文件中提取高度相关的信息。我们在三个不同的场景中对我们的模型进行了严格的评估,以验证其有效性。与LSTM、GRU和CNN-LSTM模型相比,我们的CNN-GRU模型在均方根误差、均方误差、平均绝对误差和平均绝对百分比误差方面都有显著降低。这些结果肯定了我们的CNN-GRU模型的优越预测能力,该模型有效地利用了cnn和GRU网络的优势来实现优越的预测精度。本研究利用NASA的数据来强调CNN-GRU模型在估计lib的RUL方面的杰出预测性能。
{"title":"A CNN-GRU Approach to the Accurate Prediction of Batteries’ Remaining Useful Life from Charging Profiles","authors":"Sadiqa Jafari, Yung-Cheol Byun","doi":"10.3390/computers12110219","DOIUrl":"https://doi.org/10.3390/computers12110219","url":null,"abstract":"Predicting the remaining useful life (RUL) is a pivotal step in ensuring the reliability of lithium-ion batteries (LIBs). In order to enhance the precision and stability of battery RUL prediction, this study introduces an innovative hybrid deep learning model that seamlessly integrates convolutional neural network (CNN) and gated recurrent unit (GRU) architectures. Our primary goal is to significantly improve the accuracy of RUL predictions for LIBs. Our model excels in its predictive capabilities by skillfully extracting intricate features from a diverse array of data sources, including voltage (V), current (I), temperature (T), and capacity. Within this novel architectural design, parallel CNN layers are meticulously crafted to process each input feature individually. This approach enables the extraction of highly pertinent information from multi-channel charging profiles. We subjected our model to rigorous evaluations across three distinct scenarios to validate its effectiveness. When compared to LSTM, GRU, and CNN-LSTM models, our CNN-GRU model showcases a remarkable reduction in root mean square error, mean square error, mean absolute error, and mean absolute percentage error. These results affirm the superior predictive capabilities of our CNN-GRU model, which effectively harnesses the strengths of both CNNs and GRU networks to achieve superior prediction accuracy. This study draws upon NASA data to underscore the outstanding predictive performance of the CNN-GRU model in estimating the RUL of LIBs.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136234653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing Automated Scoring of Math Self-Explanation Quality Using LLM-Generated Datasets: A Semi-Supervised Approach 使用llm生成的数据集增强数学自我解释质量的自动评分:半监督方法
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-24 DOI: 10.3390/computers12110217
Ryosuke Nakamoto, Brendan Flanagan, Taisei Yamauchi, Yiling Dai, Kyosuke Takami, Hiroaki Ogata
In the realm of mathematics education, self-explanation stands as a crucial learning mechanism, allowing learners to articulate their comprehension of intricate mathematical concepts and strategies. As digital learning platforms grow in prominence, there are mounting opportunities to collect and utilize mathematical self-explanations. However, these opportunities are met with challenges in automated evaluation. Automatic scoring of mathematical self-explanations is crucial for preprocessing tasks, including the categorization of learner responses, identification of common misconceptions, and the creation of tailored feedback and model solutions. Nevertheless, this task is hindered by the dearth of ample sample sets. Our research introduces a semi-supervised technique using the large language model (LLM), specifically its Japanese variant, to enrich datasets for the automated scoring of mathematical self-explanations. We rigorously evaluated the quality of self-explanations across five datasets, ranging from human-evaluated originals to ones devoid of original content. Our results show that combining LLM-based explanations with mathematical material significantly improves the model’s accuracy. Interestingly, there is an optimal limit to how many synthetic self-explanation data can benefit the system. Exceeding this limit does not further improve outcomes. This study thus highlights the need for careful consideration when integrating synthetic data into solutions, especially within the mathematics discipline.
在数学教育领域,自我解释是一种重要的学习机制,使学习者能够清晰地表达他们对复杂数学概念和策略的理解。随着数字学习平台的日益突出,收集和利用数学自我解释的机会越来越多。然而,这些机会在自动化评估中遇到了挑战。数学自我解释的自动评分对于预处理任务至关重要,包括学习者反应的分类,常见误解的识别,以及定制反馈和模型解决方案的创建。然而,这项任务受到缺乏充足样本集的阻碍。我们的研究引入了一种半监督技术,使用大型语言模型(LLM),特别是它的日语变体,来丰富数学自我解释自动评分的数据集。我们严格评估了五个数据集的自我解释质量,从人工评估的原件到缺乏原创内容的原件。我们的研究结果表明,将基于llm的解释与数学材料相结合可以显著提高模型的准确性。有趣的是,对于有多少合成的自我解释数据可以使系统受益,存在一个最佳限制。超过这个限制不会进一步改善结果。因此,这项研究强调了在将合成数据整合到解决方案中时,特别是在数学学科中,需要仔细考虑。
{"title":"Enhancing Automated Scoring of Math Self-Explanation Quality Using LLM-Generated Datasets: A Semi-Supervised Approach","authors":"Ryosuke Nakamoto, Brendan Flanagan, Taisei Yamauchi, Yiling Dai, Kyosuke Takami, Hiroaki Ogata","doi":"10.3390/computers12110217","DOIUrl":"https://doi.org/10.3390/computers12110217","url":null,"abstract":"In the realm of mathematics education, self-explanation stands as a crucial learning mechanism, allowing learners to articulate their comprehension of intricate mathematical concepts and strategies. As digital learning platforms grow in prominence, there are mounting opportunities to collect and utilize mathematical self-explanations. However, these opportunities are met with challenges in automated evaluation. Automatic scoring of mathematical self-explanations is crucial for preprocessing tasks, including the categorization of learner responses, identification of common misconceptions, and the creation of tailored feedback and model solutions. Nevertheless, this task is hindered by the dearth of ample sample sets. Our research introduces a semi-supervised technique using the large language model (LLM), specifically its Japanese variant, to enrich datasets for the automated scoring of mathematical self-explanations. We rigorously evaluated the quality of self-explanations across five datasets, ranging from human-evaluated originals to ones devoid of original content. Our results show that combining LLM-based explanations with mathematical material significantly improves the model’s accuracy. Interestingly, there is an optimal limit to how many synthetic self-explanation data can benefit the system. Exceeding this limit does not further improve outcomes. This study thus highlights the need for careful consideration when integrating synthetic data into solutions, especially within the mathematics discipline.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"104 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135316010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Augmented Reality Interventions for Children with Autism Spectrum Disorder (ASD): A Systematic Review 增强现实干预在自闭症谱系障碍(ASD)儿童中的应用:系统综述
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-23 DOI: 10.3390/computers12100215
A. B. M. S. U. Doulah, Mirza Rasheduzzaman, Faed Ahmed Arnob, Farhana Sarker, Nipa Roy, Md. Anwar Ullah, Khondaker A. Mamun
Over the past 10 years, the use of augmented reality (AR) applications to assist individuals with special needs such as intellectual disabilities, autism spectrum disorder (ASD), and physical disabilities has become more widespread. The beneficial features of AR for individuals with autism have driven a large amount of research into using this technology in assisting against autism-related impairments. This study aims to evaluate the effectiveness of AR in rehabilitating and training individuals with ASD through a systematic review using the PRISMA methodology. A comprehensive search of relevant databases was conducted, and 25 articles were selected for further investigation after being filtered based on inclusion criteria. The studies focused on areas such as social interaction, emotion recognition, cooperation, learning, cognitive skills, and living skills. The results showed that AR intervention was most effective in improving individuals’ social skills, followed by learning, behavioral, and living skills. This systematic review provides guidance for future research by highlighting the limitations in current research designs, control groups, sample sizes, and assessment and feedback methods. The findings indicate that augmented reality could be a useful and practical tool for supporting individuals with ASD in daily life activities and promoting their social interactions.
在过去的10年里,使用增强现实(AR)应用程序来帮助有特殊需要的个人,如智力残疾、自闭症谱系障碍(ASD)和身体残疾,已经变得越来越普遍。AR对自闭症患者有益的特性促使了大量的研究使用这项技术来帮助对抗自闭症相关的障碍。本研究旨在通过使用PRISMA方法的系统回顾来评估AR在ASD患者康复和培训中的有效性。全面检索相关数据库,根据纳入标准进行筛选,筛选出25篇文章进行进一步研究。这些研究集中在社会互动、情感识别、合作、学习、认知技能和生活技能等领域。结果显示,AR干预在提高个体的社交技能方面最有效,其次是学习、行为和生活技能。本系统综述通过强调当前研究设计、对照组、样本量以及评估和反馈方法的局限性,为未来的研究提供指导。研究结果表明,增强现实可以成为一种有用的实用工具,用于支持自闭症患者的日常生活活动和促进他们的社会互动。
{"title":"Application of Augmented Reality Interventions for Children with Autism Spectrum Disorder (ASD): A Systematic Review","authors":"A. B. M. S. U. Doulah, Mirza Rasheduzzaman, Faed Ahmed Arnob, Farhana Sarker, Nipa Roy, Md. Anwar Ullah, Khondaker A. Mamun","doi":"10.3390/computers12100215","DOIUrl":"https://doi.org/10.3390/computers12100215","url":null,"abstract":"Over the past 10 years, the use of augmented reality (AR) applications to assist individuals with special needs such as intellectual disabilities, autism spectrum disorder (ASD), and physical disabilities has become more widespread. The beneficial features of AR for individuals with autism have driven a large amount of research into using this technology in assisting against autism-related impairments. This study aims to evaluate the effectiveness of AR in rehabilitating and training individuals with ASD through a systematic review using the PRISMA methodology. A comprehensive search of relevant databases was conducted, and 25 articles were selected for further investigation after being filtered based on inclusion criteria. The studies focused on areas such as social interaction, emotion recognition, cooperation, learning, cognitive skills, and living skills. The results showed that AR intervention was most effective in improving individuals’ social skills, followed by learning, behavioral, and living skills. This systematic review provides guidance for future research by highlighting the limitations in current research designs, control groups, sample sizes, and assessment and feedback methods. The findings indicate that augmented reality could be a useful and practical tool for supporting individuals with ASD in daily life activities and promoting their social interactions.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"289 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135411639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deepfake Attacks: Generation, Detection, Datasets, Challenges, and Research Directions 深度伪造攻击:生成、检测、数据集、挑战和研究方向
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-23 DOI: 10.3390/computers12100216
Amal Naitali, Mohammed Ridouani, Fatima Salahdine, Naima Kaabouch
Recent years have seen a substantial increase in interest in deepfakes, a fast-developing field at the nexus of artificial intelligence and multimedia. These artificial media creations, made possible by deep learning algorithms, allow for the manipulation and creation of digital content that is extremely realistic and challenging to identify from authentic content. Deepfakes can be used for entertainment, education, and research; however, they pose a range of significant problems across various domains, such as misinformation, political manipulation, propaganda, reputational damage, and fraud. This survey paper provides a general understanding of deepfakes and their creation; it also presents an overview of state-of-the-art detection techniques, existing datasets curated for deepfake research, as well as associated challenges and future research trends. By synthesizing existing knowledge and research, this survey aims to facilitate further advancements in deepfake detection and mitigation strategies, ultimately fostering a safer and more trustworthy digital environment.
近年来,人们对深度造假的兴趣大幅增加,深度造假是人工智能和多媒体相结合的一个快速发展的领域。这些人工媒体创作,通过深度学习算法实现,允许操纵和创建数字内容,这些内容非常逼真,很难从真实内容中识别出来。深度造假可以用于娱乐、教育和研究;然而,它们在各个领域带来了一系列重大问题,例如错误信息、政治操纵、宣传、声誉损害和欺诈。这篇调查论文提供了对深度伪造及其创作的一般理解;它还概述了最先进的检测技术,为深度伪造研究策划的现有数据集,以及相关的挑战和未来的研究趋势。通过综合现有知识和研究,本调查旨在促进深度伪造检测和缓解策略的进一步发展,最终建立一个更安全、更值得信赖的数字环境。
{"title":"Deepfake Attacks: Generation, Detection, Datasets, Challenges, and Research Directions","authors":"Amal Naitali, Mohammed Ridouani, Fatima Salahdine, Naima Kaabouch","doi":"10.3390/computers12100216","DOIUrl":"https://doi.org/10.3390/computers12100216","url":null,"abstract":"Recent years have seen a substantial increase in interest in deepfakes, a fast-developing field at the nexus of artificial intelligence and multimedia. These artificial media creations, made possible by deep learning algorithms, allow for the manipulation and creation of digital content that is extremely realistic and challenging to identify from authentic content. Deepfakes can be used for entertainment, education, and research; however, they pose a range of significant problems across various domains, such as misinformation, political manipulation, propaganda, reputational damage, and fraud. This survey paper provides a general understanding of deepfakes and their creation; it also presents an overview of state-of-the-art detection techniques, existing datasets curated for deepfake research, as well as associated challenges and future research trends. By synthesizing existing knowledge and research, this survey aims to facilitate further advancements in deepfake detection and mitigation strategies, ultimately fostering a safer and more trustworthy digital environment.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135366445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependability Patterns: A Survey 可靠性模式:调查
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-21 DOI: 10.3390/computers12100214
Ingrid A. Buckley, Eduardo B. Fernandez
Patterns embody the experience and knowledge of designers and are effective ways to improve nonfunctional aspects of software systems. Although there are several catalogs and surveys of security patterns, there is no catalog or general survey about dependability patterns. Our survey presented an enumeration of dependability patterns, which include fault tolerance, reliability, safety, and availability patterns. After defining classification groups and showing basic pattern relationships, we showed the references to the publications where these patterns were introduced and enumerated their intents. Another objective was evaluating these patterns to see if their descriptions are appropriate for a possible catalog, which would make them useful to developers and researchers. We found that most of them need remodeling because they use ad hoc templates or no templates. We considered some models from which we can derive patterns and methodologies that incorporate the use of patterns to build dependable software systems. We also provided directions for research.
模式体现了设计人员的经验和知识,是改进软件系统非功能方面的有效方法。尽管有几个安全模式的目录和调查,但是没有关于可靠性模式的目录或一般调查。我们的调查提供了可靠性模式的枚举,其中包括容错、可靠性、安全性和可用性模式。在定义分类组并显示基本模式关系之后,我们显示了对引入这些模式的出版物的引用,并列举了它们的意图。另一个目标是评估这些模式,看看它们的描述是否适合一个可能的目录,这将使它们对开发人员和研究人员有用。我们发现它们中的大多数都需要重塑,因为它们使用临时模板或没有模板。我们考虑了一些模型,从中我们可以得到模式和方法,这些模式和方法结合了模式的使用来构建可靠的软件系统。我们还提供了研究方向。
{"title":"Dependability Patterns: A Survey","authors":"Ingrid A. Buckley, Eduardo B. Fernandez","doi":"10.3390/computers12100214","DOIUrl":"https://doi.org/10.3390/computers12100214","url":null,"abstract":"Patterns embody the experience and knowledge of designers and are effective ways to improve nonfunctional aspects of software systems. Although there are several catalogs and surveys of security patterns, there is no catalog or general survey about dependability patterns. Our survey presented an enumeration of dependability patterns, which include fault tolerance, reliability, safety, and availability patterns. After defining classification groups and showing basic pattern relationships, we showed the references to the publications where these patterns were introduced and enumerated their intents. Another objective was evaluating these patterns to see if their descriptions are appropriate for a possible catalog, which would make them useful to developers and researchers. We found that most of them need remodeling because they use ad hoc templates or no templates. We considered some models from which we can derive patterns and methodologies that incorporate the use of patterns to build dependable software systems. We also provided directions for research.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135510740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The SARS-CoV-2 Virus Detection with the Help of Artificial Intelligence (AI) and Monitoring the Disease Using Fractal Analysis 人工智能辅助SARS-CoV-2病毒检测及分形分析监测
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-21 DOI: 10.3390/computers12100213
Mihai-Virgil Nichita, Maria-Alexandra Paun, Vladimir-Alexandru Paun, Viorel-Puiu Paun
This paper introduces an AI model designed for the diagnosis and monitoring of the SARS-CoV-2 virus. The present artificial intelligence (AI) model founded on the machine learning concept was created for the identification/recognition, keeping under observation, and prediction of a patient’s clinical evaluation infected with the CoV-2 virus. The deep learning (DL)-initiated process (an AI subset) is punctually prepared to identify patterns and provide automated information to healthcare professionals. The AI algorithm is based on the fractal analysis of CT chest images, which is a practical guide to detecting the virus and establishing the degree of lung infection. CT pulmonary images, delivered by a free public source, were utilized for developing correct AI algorithms with the aim of COVID-19 virus observation/recognition, having access to coherent medical data, or not. The box-counting procedure was used with a predilection to determine the fractal parameters, the value of the fractal dimension, and the value of lacunarity. In the case of a confirmation, the analysed image is used as input data for a program responsible for measuring the degree of health impairment/damage using fractal analysis. The support of image scans with computer tomography assistance is solely the commencement part of a correctly established diagnostic. A profiled software framework has been used to perceive all the details collected. With the trained AI model, a maximum accuracy of 98.1% was obtained. This advanced procedure presents an important potential in the progress of an intricate medical solution to pulmonary disease evaluation.
本文介绍了一种用于SARS-CoV-2病毒诊断和监测的人工智能模型。基于机器学习概念的人工智能模型是为了对感染新冠病毒的患者的临床评估进行识别、观察和预测而创建的。由深度学习(DL)启动的流程(人工智能子集)可以及时识别模式并向医疗保健专业人员提供自动化信息。该AI算法基于CT胸部图像的分形分析,是检测病毒和建立肺部感染程度的实用指南。利用免费公共资源提供的肺部CT图像,开发正确的人工智能算法,目的是观察/识别COVID-19病毒,是否获得连贯的医疗数据。采用盒计数法优选分形参数、分形维数和空隙度。在确认的情况下,分析后的图像用作一个程序的输入数据,该程序负责使用分形分析测量健康损害/损害的程度。在计算机断层扫描辅助下的图像扫描的支持仅仅是正确建立诊断的开始部分。一个概要化的软件框架被用来感知收集到的所有细节。使用训练好的人工智能模型,获得了98.1%的最高准确率。这种先进的程序在肺部疾病评估的复杂医疗解决方案的进展中具有重要的潜力。
{"title":"The SARS-CoV-2 Virus Detection with the Help of Artificial Intelligence (AI) and Monitoring the Disease Using Fractal Analysis","authors":"Mihai-Virgil Nichita, Maria-Alexandra Paun, Vladimir-Alexandru Paun, Viorel-Puiu Paun","doi":"10.3390/computers12100213","DOIUrl":"https://doi.org/10.3390/computers12100213","url":null,"abstract":"This paper introduces an AI model designed for the diagnosis and monitoring of the SARS-CoV-2 virus. The present artificial intelligence (AI) model founded on the machine learning concept was created for the identification/recognition, keeping under observation, and prediction of a patient’s clinical evaluation infected with the CoV-2 virus. The deep learning (DL)-initiated process (an AI subset) is punctually prepared to identify patterns and provide automated information to healthcare professionals. The AI algorithm is based on the fractal analysis of CT chest images, which is a practical guide to detecting the virus and establishing the degree of lung infection. CT pulmonary images, delivered by a free public source, were utilized for developing correct AI algorithms with the aim of COVID-19 virus observation/recognition, having access to coherent medical data, or not. The box-counting procedure was used with a predilection to determine the fractal parameters, the value of the fractal dimension, and the value of lacunarity. In the case of a confirmation, the analysed image is used as input data for a program responsible for measuring the degree of health impairment/damage using fractal analysis. The support of image scans with computer tomography assistance is solely the commencement part of a correctly established diagnostic. A profiled software framework has been used to perceive all the details collected. With the trained AI model, a maximum accuracy of 98.1% was obtained. This advanced procedure presents an important potential in the progress of an intricate medical solution to pulmonary disease evaluation.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135512024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
L-PRNU: Low-Complexity Privacy-Preserving PRNU-Based Camera Attribution Scheme L-PRNU:基于低复杂度隐私保护prnu的相机归属方案
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-20 DOI: 10.3390/computers12100212
Alan Huang, Justie Su-Tzu Juan
A personal camera fingerprint can be created from images in social media by using Photo Response Non-Uniformity (PRNU) noise, which is used to identify whether an unknown picture belongs to them. Social media has become ubiquitous in recent years and many of us regularly share photos of our daily lives online. However, due to the ease of creating a PRNU-based camera fingerprint, the privacy leakage problem is taken more seriously. To address this issue, a security scheme based on Boneh–Goh–Nissim (BGN) encryption was proposed in 2021. While effective, the BGN encryption incurs a high run-time computational overhead due to its power computation. Therefore, we devised a new scheme to address this issue, employing polynomial encryption and pixel confusion methods, resulting in a computation time that is over ten times faster than BGN encryption. This eliminates the need to only send critical pixels to a Third-Party Expert in the previous method. Furthermore, our scheme does not require decryption, as polynomial encryption and pixel confusion do not alter the correlation value. Consequently, the scheme we presented surpasses previous methods in both theoretical analysis and experimental performance, being faster and more capable.
通过使用照片响应非均匀性(PRNU)噪声,可以从社交媒体上的图像创建个人相机指纹,该噪声用于识别未知照片是否属于他们。近年来,社交媒体变得无处不在,我们中的许多人经常在网上分享我们日常生活的照片。然而,由于基于prnu的相机指纹易于创建,隐私泄露问题更加严重。为了解决这个问题,2021年提出了一种基于Boneh-Goh-Nissim (BGN)加密的安全方案。BGN加密虽然有效,但由于其强大的计算能力,会导致较高的运行时计算开销。因此,我们设计了一个新的方案来解决这个问题,采用多项式加密和像素混淆方法,导致计算时间比BGN加密快十倍以上。这消除了在前一种方法中只向第三方专家发送关键像素的需要。此外,我们的方案不需要解密,因为多项式加密和像素混淆不会改变相关值。因此,我们提出的方案在理论分析和实验性能上都超越了以往的方法,速度更快,能力更强。
{"title":"L-PRNU: Low-Complexity Privacy-Preserving PRNU-Based Camera Attribution Scheme","authors":"Alan Huang, Justie Su-Tzu Juan","doi":"10.3390/computers12100212","DOIUrl":"https://doi.org/10.3390/computers12100212","url":null,"abstract":"A personal camera fingerprint can be created from images in social media by using Photo Response Non-Uniformity (PRNU) noise, which is used to identify whether an unknown picture belongs to them. Social media has become ubiquitous in recent years and many of us regularly share photos of our daily lives online. However, due to the ease of creating a PRNU-based camera fingerprint, the privacy leakage problem is taken more seriously. To address this issue, a security scheme based on Boneh–Goh–Nissim (BGN) encryption was proposed in 2021. While effective, the BGN encryption incurs a high run-time computational overhead due to its power computation. Therefore, we devised a new scheme to address this issue, employing polynomial encryption and pixel confusion methods, resulting in a computation time that is over ten times faster than BGN encryption. This eliminates the need to only send critical pixels to a Third-Party Expert in the previous method. Furthermore, our scheme does not require decryption, as polynomial encryption and pixel confusion do not alter the correlation value. Consequently, the scheme we presented surpasses previous methods in both theoretical analysis and experimental performance, being faster and more capable.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135616969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classifying the Main Technology Clusters and Assignees of Home Automation Networks Using Patent Classifications 利用专利分类对家庭自动化网络主要技术集群和受让人进行分类
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-20 DOI: 10.3390/computers12100211
Konstantinos Charmanas, Konstantinos Georgiou, Nikolaos Mittas, Lefteris Angelis
Home automation technologies are a vital part of humanity, as they provide convenience in otherwise mundane and repetitive tasks. In recent years, given the development of the Internet of Things (IoT) and artificial intelligence (AI) sectors, these technologies have seen a tremendous rise, both in the methodologies utilized and in their industrial impact. Hence, many organizations and companies are securing commercial rights by patenting such technologies. In this study, we employ an analysis of 8482 home automation patents from the United States Patent and Trademark Office (USPTO) to extract thematic clusters and distinguish those that drive the market and those that have declined over the course of time. Moreover, we identify prevalent competitors per cluster and analyze the results under the spectrum of their market impact and objectives. The key findings indicate that home automation networks encompass a variety of technological areas and organizations with diverse interests.
家庭自动化技术是人类的重要组成部分,因为它们为其他平凡和重复的任务提供了便利。近年来,随着物联网(IoT)和人工智能(AI)领域的发展,这些技术在使用的方法和工业影响方面都有了巨大的发展。因此,许多组织和公司通过为这些技术申请专利来确保商业权利。在本研究中,我们对来自美国专利商标局(USPTO)的8482项家庭自动化专利进行了分析,以提取主题集群,并区分那些推动市场发展的专利和那些随着时间的推移而衰落的专利。此外,我们确定了每个集群的主要竞争对手,并在其市场影响和目标的范围内分析了结果。主要研究结果表明,家庭自动化网络涵盖了各种技术领域和不同兴趣的组织。
{"title":"Classifying the Main Technology Clusters and Assignees of Home Automation Networks Using Patent Classifications","authors":"Konstantinos Charmanas, Konstantinos Georgiou, Nikolaos Mittas, Lefteris Angelis","doi":"10.3390/computers12100211","DOIUrl":"https://doi.org/10.3390/computers12100211","url":null,"abstract":"Home automation technologies are a vital part of humanity, as they provide convenience in otherwise mundane and repetitive tasks. In recent years, given the development of the Internet of Things (IoT) and artificial intelligence (AI) sectors, these technologies have seen a tremendous rise, both in the methodologies utilized and in their industrial impact. Hence, many organizations and companies are securing commercial rights by patenting such technologies. In this study, we employ an analysis of 8482 home automation patents from the United States Patent and Trademark Office (USPTO) to extract thematic clusters and distinguish those that drive the market and those that have declined over the course of time. Moreover, we identify prevalent competitors per cluster and analyze the results under the spectrum of their market impact and objectives. The key findings indicate that home automation networks encompass a variety of technological areas and organizations with diverse interests.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135570281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1