首页 > 最新文献

Journal of King Saud University-Computer and Information Sciences最新文献

英文 中文
Heterogeneous emotional contagion of the cyber–physical society 网络物理社会的异质情绪传染
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-18 DOI: 10.1016/j.jksuci.2024.102193

When emergencies occur, panic spreads quickly across cyberspace and physical space. Despite widespread attention to emotional contagion in cyber–physical societies (CPS), existing studies often overlook individual relationship heterogeneity, which results in imprecise models. To address this issue, we propose a heterogeneous emotional contagion method for CPS. First, we introduce the Strong–Weak Emotional Contagion Model (SW-ECM) to simulate the heterogeneous emotional contagion process in CPS. Second, we formulate the mean-field equations for the SW-ECM to accurately capture the dynamic evolution of heterogeneous emotional contagion in the CPS. Finally, we construct a small-world network based on strong–weak relationships to validate the effectiveness of our method. The experimental results show that our method can effectively simulate the heterogeneous emotional contagion and capture changes in relationships between individuals, providing valuable guidance for crowd evacuations prone to emotional contagion.

当紧急情况发生时,恐慌会在网络空间和物理空间迅速蔓延。尽管网络物理社会(CPS)中的情绪传染受到广泛关注,但现有研究往往忽略了个体关系的异质性,从而导致模型不精确。为了解决这个问题,我们提出了一种适用于 CPS 的异质性情感传染方法。首先,我们引入强弱情感传染模型(SW-ECM)来模拟 CPS 中的异质情感传染过程。其次,我们提出了 SW-ECM 的均场方程,以准确捕捉 CPS 中异质情绪传染的动态演化过程。最后,我们构建了一个基于强弱关系的小世界网络来验证我们方法的有效性。实验结果表明,我们的方法可以有效地模拟异质情绪传染并捕捉个体间关系的变化,为容易发生情绪传染的人群疏散提供有价值的指导。
{"title":"Heterogeneous emotional contagion of the cyber–physical society","authors":"","doi":"10.1016/j.jksuci.2024.102193","DOIUrl":"10.1016/j.jksuci.2024.102193","url":null,"abstract":"<div><p>When emergencies occur, panic spreads quickly across cyberspace and physical space. Despite widespread attention to emotional contagion in cyber–physical societies (CPS), existing studies often overlook individual relationship heterogeneity, which results in imprecise models. To address this issue, we propose a heterogeneous emotional contagion method for CPS. First, we introduce the Strong–Weak Emotional Contagion Model (SW-ECM) to simulate the heterogeneous emotional contagion process in CPS. Second, we formulate the mean-field equations for the SW-ECM to accurately capture the dynamic evolution of heterogeneous emotional contagion in the CPS. Finally, we construct a small-world network based on strong–weak relationships to validate the effectiveness of our method. The experimental results show that our method can effectively simulate the heterogeneous emotional contagion and capture changes in relationships between individuals, providing valuable guidance for crowd evacuations prone to emotional contagion.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002829/pdfft?md5=f933d896a76a94be422b19df9a07b8ff&pid=1-s2.0-S1319157824002829-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142272806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel edge intelligence-based solution for safer footpath navigation of visually impaired using computer vision 基于边缘智能的新型解决方案,利用计算机视觉为视障人士提供更安全的人行道导航
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.1016/j.jksuci.2024.102191

Navigating through a tactile paved footpath surrounded by various sizes of static and dynamic obstacles is one of the biggest impediments visually impaired people face, especially in Dhaka, Bangladesh. This problem is important to address, considering the number of accidents in such densely populated footpaths. We propose a novel deep-edge solution using Computer Vision to make people aware of the obstacles in the vicinity and reduce the necessity of a walking cane. This study introduces a diverse novel tactile footpath dataset of Dhaka covering different city areas. Additionally, existing state-of-the-art deep neural networks for object detection have been fine-tuned and investigated using this dataset. A heuristic-based breadth-first navigation algorithm (HBFN) is developed to provide navigation directions that are safe and obstacle-free, which is then deployed in a smartphone application that automatically captures images of the footpath ahead to provide real-time navigation guidance delivered by speech. The findings from this study demonstrate the effectiveness of the object detection model, YOLOv8s, which outperformed other benchmark models on this dataset, achieving a high mAP of 0.974 and an F1 score of 0.934. The model’s performance is analyzed after quantization, reducing its size by 49.53% while retaining 98.97% of the original mAP.

在被各种大小的静态和动态障碍物包围的触觉铺设人行道上导航是视障人士面临的最大障碍之一,尤其是在孟加拉国的达卡。考虑到在这种人口密集的人行道上发生的事故数量,解决这个问题非常重要。我们利用计算机视觉技术提出了一种新颖的深边缘解决方案,让人们意识到附近的障碍物,减少使用手杖的必要性。本研究引入了达卡的各种新型触觉人行道数据集,涵盖了不同的城市区域。此外,还利用该数据集对用于物体检测的现有最先进的深度神经网络进行了微调和研究。开发的基于启发式的广度优先导航算法(HBFN)可提供安全、无障碍的导航指引,然后将其部署到智能手机应用程序中,该应用程序可自动捕捉前方人行道的图像,通过语音提供实时导航指引。研究结果证明了物体检测模型 YOLOv8s 的有效性,该模型在该数据集上的表现优于其他基准模型,mAP 高达 0.974,F1 得分为 0.934。对模型量化后的性能进行了分析,量化后的模型大小减少了 49.53%,同时保留了 98.97% 的原始 mAP。
{"title":"A novel edge intelligence-based solution for safer footpath navigation of visually impaired using computer vision","authors":"","doi":"10.1016/j.jksuci.2024.102191","DOIUrl":"10.1016/j.jksuci.2024.102191","url":null,"abstract":"<div><p>Navigating through a tactile paved footpath surrounded by various sizes of static and dynamic obstacles is one of the biggest impediments visually impaired people face, especially in Dhaka, Bangladesh. This problem is important to address, considering the number of accidents in such densely populated footpaths. We propose a novel deep-edge solution using Computer Vision to make people aware of the obstacles in the vicinity and reduce the necessity of a walking cane. This study introduces a diverse novel tactile footpath dataset of Dhaka covering different city areas. Additionally, existing state-of-the-art deep neural networks for object detection have been fine-tuned and investigated using this dataset. A heuristic-based breadth-first navigation algorithm (HBFN) is developed to provide navigation directions that are safe and obstacle-free, which is then deployed in a smartphone application that automatically captures images of the footpath ahead to provide real-time navigation guidance delivered by speech. The findings from this study demonstrate the effectiveness of the object detection model, YOLOv8s, which outperformed other benchmark models on this dataset, achieving a high mAP of 0.974 and an F1 score of 0.934. The model’s performance is analyzed after quantization, reducing its size by 49.53% while retaining 98.97% of the original mAP.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002805/pdfft?md5=67af390c0280c8b6ae2c05684fbae69f&pid=1-s2.0-S1319157824002805-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142272843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving embedding-based link prediction performance using clustering 利用聚类提高基于嵌入的链接预测性能
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-13 DOI: 10.1016/j.jksuci.2024.102181

Incomplete knowledge graphs are common problem that can impair task accuracy. As knowledge graphs grow extensively, the probability of incompleteness increases. Link prediction addresses this problem, but accurate and efficient link prediction methods are needed to handle incomplete and extensive knowledge graphs. This study proposed modifications to the embedding-based link prediction using clustering to improve performance. The proposed method involves four main processes: embedding, clustering, determining clusters, and scoring. Embedding converts entities and relations into vectors while clustering groups these vectors. Selected clusters are determined based on the shortest distance between the centroid and the incomplete knowledge graph. Scoring measures relation rankings, and link prediction result is selected based on highest scores. The link prediction performance is evaluated using Hits@1, Mean Rank, Mean Reciprocal Rank and prediction time on three knowledge graph datasets: WN11, WN18RR, and FB13. The link prediction methods used are TransE and ComplEx, with BIRCH as the clustering technique and Mahalanobis for short-distance measurement. The proposed method significantly improves link prediction performance, achieving accuracy up to 98% and reducing prediction time by 99%. This study provides effective and efficient solution for improving link prediction, demonstrating high accuracy and efficiency in handling incomplete and extensive knowledge graphs.

知识图谱不完整是影响任务准确性的常见问题。随着知识图谱的扩展,不完整的概率也会增加。链接预测可以解决这个问题,但需要准确高效的链接预测方法来处理不完整和广泛的知识图谱。本研究提出利用聚类对基于嵌入的链接预测进行修改,以提高性能。建议的方法包括四个主要过程:嵌入、聚类、确定聚类和评分。嵌入将实体和关系转换为向量,而聚类则将这些向量分组。根据中心点与不完整知识图谱之间的最短距离确定选定的聚类。评分衡量关系排名,并根据最高分选出链接预测结果。在三个知识图谱数据集上,使用点击率@1、平均排名、平均互易排名和预测时间对链接预测性能进行了评估:三个知识图谱数据集:WN11、WN18RR 和 FB13。使用的链接预测方法是 TransE 和 ComplEx,聚类技术是 BIRCH,短距离测量是 Mahalanobis。所提出的方法大大提高了链路预测性能,准确率高达 98%,预测时间缩短了 99%。这项研究为改进链接预测提供了有效和高效的解决方案,在处理不完整和广泛的知识图谱时表现出高精度和高效率。
{"title":"Improving embedding-based link prediction performance using clustering","authors":"","doi":"10.1016/j.jksuci.2024.102181","DOIUrl":"10.1016/j.jksuci.2024.102181","url":null,"abstract":"<div><p>Incomplete knowledge graphs are common problem that can impair task accuracy. As knowledge graphs grow extensively, the probability of incompleteness increases. Link prediction addresses this problem, but accurate and efficient link prediction methods are needed to handle incomplete and extensive knowledge graphs. This study proposed modifications to the embedding-based link prediction using clustering to improve performance. The proposed method involves four main processes: embedding, clustering, determining clusters, and scoring. Embedding converts entities and relations into vectors while clustering groups these vectors. Selected clusters are determined based on the shortest distance between the centroid and the incomplete knowledge graph. Scoring measures relation rankings, and link prediction result is selected based on highest scores. The link prediction performance is evaluated using Hits@1, Mean Rank, Mean Reciprocal Rank and prediction time on three knowledge graph datasets: WN11, WN18RR, and FB13. The link prediction methods used are TransE and ComplEx, with BIRCH as the clustering technique and Mahalanobis for short-distance measurement. The proposed method significantly improves link prediction performance, achieving accuracy up to 98% and reducing prediction time by 99%. This study provides effective and efficient solution for improving link prediction, demonstrating high accuracy and efficiency in handling incomplete and extensive knowledge graphs.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002702/pdfft?md5=e31143cd70a22f8ffa2da3a54e983856&pid=1-s2.0-S1319157824002702-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142241566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RAPID: Robust multi-pAtch masker using channel-wise Pooled varIance with two-stage patch Detection RAPID:利用信道汇集变异和两级补丁检测的鲁棒多咀屏蔽器
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-11 DOI: 10.1016/j.jksuci.2024.102188

Recently, adversarial patches have become frequently used in adversarial attacks in real-world settings, evolving into various shapes and numbers. However, existing defense methods often exhibit limitations in addressing specific attacks, datasets, or conditions. This underscores the demand for versatile and robust defenses capable of operating across diverse scenarios. In this paper, we propose the RAPID (Robust multi-pAtch masker using channel-wise Pooled varIance with two-stage patch Detection) framework, a stable solution to restore detection efficacy in the presence of multiple patches. The RAPID framework excels in defending against attacks regardless of patch number or shape, offering a versatile defense adaptable to diverse adversarial scenarios. RAPID employs a two-stage strategy to identify and mask coordinates associated with patch attacks. In the first stage, we propose the ‘channel-wise pooled variance’ to detect candidate patch regions. In the second step, upon detecting these regions, we identify dense areas as patches and mask them accordingly. This framework easily integrates into the preprocessing stage of any object detection model due to its independent structure, requiring no modifications to the model itself. Evaluation indicates that RAPID enhances robustness by up to 60% compared to other defenses. RAPID achieves mAP50 and mAP@50-95 values of 0.696 and 0.479, respectively.

最近,对抗性补丁在现实世界的对抗性攻击中被频繁使用,并演变成各种形状和数量。然而,现有的防御方法在应对特定攻击、数据集或条件时往往表现出局限性。这凸显了对能够在不同场景下运行的多功能、强大的防御系统的需求。在本文中,我们提出了 RAPID(Robust multi-pAtch masker using channel-wise Pooled varIance with two-stage patch Detection)框架,这是一种在存在多个补丁的情况下恢复检测功效的稳定解决方案。RAPID 框架在抵御攻击方面表现出色,无论补丁数量或形状如何,都能提供适应不同对抗场景的多功能防御。RAPID 采用两阶段策略来识别和屏蔽与补丁攻击相关的坐标。在第一阶段,我们提出了 "信道汇集方差 "来检测候选补丁区域。第二步,在检测到这些区域后,我们将密集区域识别为补丁,并对其进行相应的屏蔽。由于该框架结构独立,无需修改模型本身,因此可轻松集成到任何物体检测模型的预处理阶段。评估结果表明,与其他防御方法相比,RAPID 增强了高达 60% 的鲁棒性。RAPID 的 mAP50 和 mAP@50-95 值分别为 0.696 和 0.479。
{"title":"RAPID: Robust multi-pAtch masker using channel-wise Pooled varIance with two-stage patch Detection","authors":"","doi":"10.1016/j.jksuci.2024.102188","DOIUrl":"10.1016/j.jksuci.2024.102188","url":null,"abstract":"<div><p>Recently, adversarial patches have become frequently used in adversarial attacks in real-world settings, evolving into various shapes and numbers. However, existing defense methods often exhibit limitations in addressing specific attacks, datasets, or conditions. This underscores the demand for versatile and robust defenses capable of operating across diverse scenarios. In this paper, we propose the RAPID (<strong>R</strong>obust multi-p<strong>A</strong>tch masker using channel-wise <strong>P</strong>ooled var<strong>I</strong>ance with two-stage patch <strong>D</strong>etection) framework, a stable solution to restore detection efficacy in the presence of multiple patches. The RAPID framework excels in defending against attacks regardless of patch number or shape, offering a versatile defense adaptable to diverse adversarial scenarios. RAPID employs a two-stage strategy to identify and mask coordinates associated with patch attacks. In the first stage, we propose the ‘channel-wise pooled variance’ to detect candidate patch regions. In the second step, upon detecting these regions, we identify dense areas as patches and mask them accordingly. This framework easily integrates into the preprocessing stage of any object detection model due to its independent structure, requiring no modifications to the model itself. Evaluation indicates that RAPID enhances robustness by up to 60% compared to other defenses. RAPID achieves mAP50 and mAP@50-95 values of 0.696 and 0.479, respectively.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002775/pdfft?md5=097312e661d7cf2bd4bcbc118fd164bd&pid=1-s2.0-S1319157824002775-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A sharding blockchain protocol for enhanced scalability and performance optimization through account transaction reconfiguration 通过账户交易重新配置增强可扩展性和性能优化的分片区块链协议
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-11 DOI: 10.1016/j.jksuci.2024.102184

Sharding is a critical technology for enhancing blockchain scalability. However, existing sharding blockchain protocols suffer from a high cross-shard ratio, high transaction latency, limited throughput enhancement, and high account migration. To address these problems, this paper proposes a sharding blockchain protocol for enhanced scalability and performance optimization through account transaction reconfiguration. Firstly, we construct a blockchain transaction account graph network structure to analyze transaction account correlations. Secondly, a modularity-based account transaction reconfiguration algorithm and a detailed account reconfiguration process is designed to minimize cross-shard transactions. Finally, we introduce a transaction processing mechanism for account transaction reconfiguration in parallel with block consensus uploading, which reduces the reconfiguration time overhead and system latency. Experimental results demonstrate substantial performance improvements compared to existing shard protocols: up to a 34.7% reduction in cross-shard transaction ratio, at least an 83.2% decrease in transaction latency, at least a 52.7% increase in throughput and a 7.8% decrease in account migration number. The proposed protocol significantly enhances the overall performance and scalability of blockchain, providing robust support for blockchain applications in various fields such as financial services, supply chain management, and industrial Internet of Things. It also enables better support for high-concurrency scenarios and large-scale network environments.

分片是提高区块链可扩展性的关键技术。然而,现有的分片区块链协议存在跨分片比率高、交易延迟高、吞吐量提升有限以及账户迁移率高等问题。针对这些问题,本文提出了一种分片区块链协议,通过账户交易重构来增强可扩展性和优化性能。首先,我们构建了区块链交易账户图网络结构,分析交易账户相关性。其次,我们设计了一种基于模块化的账户交易重构算法和详细的账户重构流程,以尽量减少跨分区交易。最后,我们引入了与区块共识上传并行的账户交易重新配置交易处理机制,从而减少了重新配置时间开销和系统延迟。实验结果表明,与现有的分片协议相比,该协议的性能有了大幅提升:跨分片交易比率降低了 34.7%,交易延迟至少减少了 83.2%,吞吐量至少增加了 52.7%,账户迁移数量减少了 7.8%。所提出的协议大大提高了区块链的整体性能和可扩展性,为金融服务、供应链管理和工业物联网等各个领域的区块链应用提供了强有力的支持。它还能更好地支持高并发场景和大规模网络环境。
{"title":"A sharding blockchain protocol for enhanced scalability and performance optimization through account transaction reconfiguration","authors":"","doi":"10.1016/j.jksuci.2024.102184","DOIUrl":"10.1016/j.jksuci.2024.102184","url":null,"abstract":"<div><p>Sharding is a critical technology for enhancing blockchain scalability. However, existing sharding blockchain protocols suffer from a high cross-shard ratio, high transaction latency, limited throughput enhancement, and high account migration. To address these problems, this paper proposes a sharding blockchain protocol for enhanced scalability and performance optimization through account transaction reconfiguration. Firstly, we construct a blockchain transaction account graph network structure to analyze transaction account correlations. Secondly, a modularity-based account transaction reconfiguration algorithm and a detailed account reconfiguration process is designed to minimize cross-shard transactions. Finally, we introduce a transaction processing mechanism for account transaction reconfiguration in parallel with block consensus uploading, which reduces the reconfiguration time overhead and system latency. Experimental results demonstrate substantial performance improvements compared to existing shard protocols: up to a 34.7% reduction in cross-shard transaction ratio, at least an 83.2% decrease in transaction latency, at least a 52.7% increase in throughput and a 7.8% decrease in account migration number. The proposed protocol significantly enhances the overall performance and scalability of blockchain, providing robust support for blockchain applications in various fields such as financial services, supply chain management, and industrial Internet of Things. It also enables better support for high-concurrency scenarios and large-scale network environments.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002738/pdfft?md5=107fe417689144e59c75fddd0f5b671f&pid=1-s2.0-S1319157824002738-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and FPGA implementation of nested grid multi-scroll chaotic system 嵌套网格多卷混沌系统的设计与 FPGA 实现
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-10 DOI: 10.1016/j.jksuci.2024.102186

Conventional multi-scroll chaotic systems are often constrained by the number of attractors and the complexity of generation, making it challenging to meet the increasing demands of communication and computation. This paper revolves around the modified Chua’s system. By modifying its differential equation and introducing traditional nonlinear functions, such as the step function sequence and sawtooth function sequence. A nested grid multi-scroll chaotic system (NGMSCS) can be established, capable of generating nested grid multi-scroll attractors. In contrast to conventional grid multi-scroll chaotic attractors, scroll-like phenomena can be initiated outside the grid structure, thereby revealing more complex dynamic behavior and topological features. Through the theoretical design and analysis of the equilibrium point of the system and its stability, the number of saddle-focused equilibrium points of index 2 is further expanded, which can generate (2 N+2) × M attractors, and the formation mechanism is elaborated and verified in detail. In addition, the generation of an arbitrary number of equilibrium points in the y-direction is achieved by transforming the x and y variables, which can generate M×(2 N+2) attractors, increasing the complexity of the system. The system’s dynamical properties are discussed in depth via time series plots, Lyapunov exponents, Poincaré cross sections, 0–1 tests, bifurcation diagrams, and attraction basins. The existence of attractors is confirmed through numerical simulations and FPGA-based hardware experiments.

传统的多辊混沌系统往往受制于吸引子的数量和生成的复杂性,因而难以满足日益增长的通信和计算需求。本文围绕修正的蔡氏系统展开论述。通过修改其微分方程并引入传统的非线性函数,如阶跃函数序列和锯齿函数序列。嵌套网格多卷混沌系统(NGMSCS)就可以建立起来,并能产生嵌套网格多卷吸引子。与传统的网格多卷积混沌吸引子相比,卷积现象可以在网格结构之外启动,从而显示出更复杂的动态行为和拓扑特征。通过对系统平衡点及其稳定性的理论设计和分析,进一步扩展了指数为 2 的鞍焦平衡点数量,可生成(2 N+2 )×M 个吸引子,并详细阐述和验证了其形成机理。此外,通过变换 x 和 y 变量,在 y 方向上生成任意数量的平衡点,可产生 M×(2 N+2) 个吸引子,增加了系统的复杂性。通过时间序列图、Lyapunov 指数、Poincaré 截面、0-1 检验、分岔图和吸引盆地,深入讨论了系统的动力学特性。吸引子的存在通过数值模拟和基于 FPGA 的硬件实验得到了证实。
{"title":"Design and FPGA implementation of nested grid multi-scroll chaotic system","authors":"","doi":"10.1016/j.jksuci.2024.102186","DOIUrl":"10.1016/j.jksuci.2024.102186","url":null,"abstract":"<div><p>Conventional multi-scroll chaotic systems are often constrained by the number of attractors and the complexity of generation, making it challenging to meet the increasing demands of communication and computation. This paper revolves around the modified Chua’s system. By modifying its differential equation and introducing traditional nonlinear functions, such as the step function sequence and sawtooth function sequence. A nested grid multi-scroll chaotic system (NGMSCS) can be established, capable of generating nested grid multi-scroll attractors. In contrast to conventional grid multi-scroll chaotic attractors, scroll-like phenomena can be initiated outside the grid structure, thereby revealing more complex dynamic behavior and topological features. Through the theoretical design and analysis of the equilibrium point of the system and its stability, the number of saddle-focused equilibrium points of index 2 is further expanded, which can generate (2 N+2) × M attractors, and the formation mechanism is elaborated and verified in detail. In addition, the generation of an arbitrary number of equilibrium points in the <em>y</em>-direction is achieved by transforming the <em>x</em> and <em>y</em> variables, which can generate M×(2 N+2) attractors, increasing the complexity of the system. The system’s dynamical properties are discussed in depth via time series plots, Lyapunov exponents, Poincaré cross sections, 0–1 tests, bifurcation diagrams, and attraction basins. The existence of attractors is confirmed through numerical simulations and FPGA-based hardware experiments.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002751/pdfft?md5=5a97268ac1950c4cb177bec835b9c871&pid=1-s2.0-S1319157824002751-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142233768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards the development of believable agents: Adopting neural architectures and adaptive neuro-fuzzy inference system via playback of human traces 开发可信的代理:通过回放人类痕迹采用神经架构和自适应神经模糊推理系统
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.jksuci.2024.102182

Artificial intelligence (AI) research on video games primarily focused on the imitation of human-like behavior during the past few years. Moreover, to increase the perceived worth of amusement and gratification, there is an enormous rise in the demand for intelligent agents that can imitate human players and video game characters. However, the agents developed using the majority of current approaches are perceived as rather more mechanical, which leads to frustration, and more importantly, failure in engagement. On that account, this study proposes an imitation learning framework to generate human-like behavior for more precise and accurate reproduction. To build a computational model, two learning paradigms are explored, artificial neural networks (ANN) and adaptive neuro-fuzzy inference systems (ANFIS). This study utilized several variations of ANN, including feed-forward, recurrent, extreme learning machines, and regressions, to simulate human player behavior. Furthermore, to find the ideal ANFIS, grid partitioning, subtractive clustering, and fuzzy c-means clustering are used for training. The results demonstrate that ANFIS hybrid intelligence systems trained with subtractive clustering are overall best with an average accuracy of 95%, followed by fuzzy c-means with an average accuracy of 87%. Also, the believability of the obtained AI agents is tested using two statistical methods, i.e., the Mann–Whitney U test and the cosine similarity analysis. Both methods validate that the observed behavior has been reproduced with high accuracy.

在过去几年里,有关视频游戏的人工智能(AI)研究主要集中在模仿人类行为上。此外,为了提高娱乐和满足感的感知价值,对能够模仿人类玩家和视频游戏角色的智能代理的需求也大幅上升。然而,目前使用大多数方法开发的代理被认为是比较机械的,这会导致挫败感,更重要的是,会导致参与失败。有鉴于此,本研究提出了一种模仿学习框架,以生成类似人类的行为,从而实现更精确、更准确的再现。为了建立一个计算模型,我们探索了两种学习范式,即人工神经网络(ANN)和自适应神经模糊推理系统(ANFIS)。本研究利用了几种不同的人工神经网络,包括前馈、递归、极端学习机和回归,来模拟人类球员的行为。此外,为了找到理想的 ANFIS,还使用了网格划分、减法聚类和模糊 c-means 聚类来进行训练。结果表明,使用减法聚类训练的 ANFIS 混合智能系统总体最佳,平均准确率为 95%,其次是模糊 c-means,平均准确率为 87%。此外,还使用两种统计方法,即曼-惠特尼 U 检验和余弦相似性分析,对所获得的人工智能代理的可信度进行了测试。这两种方法都验证了观察到的行为得到了高精度的再现。
{"title":"Towards the development of believable agents: Adopting neural architectures and adaptive neuro-fuzzy inference system via playback of human traces","authors":"","doi":"10.1016/j.jksuci.2024.102182","DOIUrl":"10.1016/j.jksuci.2024.102182","url":null,"abstract":"<div><p>Artificial intelligence (AI) research on video games primarily focused on the imitation of human-like behavior during the past few years. Moreover, to increase the perceived worth of amusement and gratification, there is an enormous rise in the demand for intelligent agents that can imitate human players and video game characters. However, the agents developed using the majority of current approaches are perceived as rather more mechanical, which leads to frustration, and more importantly, failure in engagement. On that account, this study proposes an imitation learning framework to generate human-like behavior for more precise and accurate reproduction. To build a computational model, two learning paradigms are explored, artificial neural networks (ANN) and adaptive neuro-fuzzy inference systems (ANFIS). This study utilized several variations of ANN, including feed-forward, recurrent, extreme learning machines, and regressions, to simulate human player behavior. Furthermore, to find the ideal ANFIS, grid partitioning, subtractive clustering, and fuzzy c-means clustering are used for training. The results demonstrate that ANFIS hybrid intelligence systems trained with subtractive clustering are overall best with an average accuracy of 95%, followed by fuzzy c-means with an average accuracy of 87%. Also, the believability of the obtained AI agents is tested using two statistical methods, i.e., the Mann–Whitney U test and the cosine similarity analysis. Both methods validate that the observed behavior has been reproduced with high accuracy.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002714/pdfft?md5=542b4e8449657f4dbd195276e5fb54c1&pid=1-s2.0-S1319157824002714-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142229614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GCNT: Identify influential seed set effectively in social networks by integrating graph convolutional networks with graph transformers GCNT:通过将图卷积网络与图转换器整合,有效识别社交网络中具有影响力的种子集
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.jksuci.2024.102183

Exploring effective and efficient strategies for identifying influential nodes from social networks as seeds to promote the propagation of influence remains a crucial challenge in the field of influence maximization (IM), which has attracted significant research efforts. Deep learning-based approaches have been adopted as an alternative promising solution to the IM problem. However, a robust model that captures the associations between network information and node influence needs to be investigated, while concurrently considering the effects of the overlapped influence on training labels. To address these challenges, a GCNT model, which integrates Graph Convolutional Networks with Graph Transformers, is introduced in this paper to capture the intricate relationships among the topology of the network, node attributes, and node influence effectively. Furthermore, an innovative method called Greedy-LIE is proposed to generate labels to alleviate the issue of overlapped influence spread. Moreover, a Mask mechanism specially tailored for the IM problem is presented along with an input embedding balancing strategy. The effectiveness of the GCNT model is demonstrated through comprehensive experiments conducted on six real-world networks, and the model shows its competitive performance in terms of both influence maximization and computational efficiency over state-of-the-art methods.

在影响力最大化(IM)领域,探索从社交网络中识别有影响力的节点作为种子以促进影响力传播的切实有效的策略仍然是一个重要挑战,吸引了大量研究人员的努力。基于深度学习的方法已被采用,作为解决 IM 问题的另一种有前途的方案。然而,需要研究一种能捕捉网络信息与节点影响力之间关联的稳健模型,同时考虑重叠影响力对训练标签的影响。为了应对这些挑战,本文引入了一个 GCNT 模型,该模型将图卷积网络与图变换器整合在一起,能有效捕捉网络拓扑、节点属性和节点影响力之间错综复杂的关系。此外,本文还提出了一种名为 "Greedy-LIE "的创新方法来生成标签,以缓解影响扩散重叠的问题。此外,还提出了专门针对 IM 问题的掩码机制以及输入嵌入平衡策略。通过在六个真实世界网络上进行的综合实验,证明了 GCNT 模型的有效性,而且该模型在影响力最大化和计算效率方面的表现都优于最先进的方法。
{"title":"GCNT: Identify influential seed set effectively in social networks by integrating graph convolutional networks with graph transformers","authors":"","doi":"10.1016/j.jksuci.2024.102183","DOIUrl":"10.1016/j.jksuci.2024.102183","url":null,"abstract":"<div><p>Exploring effective and efficient strategies for identifying influential nodes from social networks as seeds to promote the propagation of influence remains a crucial challenge in the field of influence maximization (IM), which has attracted significant research efforts. Deep learning-based approaches have been adopted as an alternative promising solution to the IM problem. However, a robust model that captures the associations between network information and node influence needs to be investigated, while concurrently considering the effects of the overlapped influence on training labels. To address these challenges, a GCNT model, which integrates Graph Convolutional Networks with Graph Transformers, is introduced in this paper to capture the intricate relationships among the topology of the network, node attributes, and node influence effectively. Furthermore, an innovative method called <span><math><mrow><mi>G</mi><mi>r</mi><mi>e</mi><mi>e</mi><mi>d</mi><mi>y</mi></mrow></math></span>-<span><math><mrow><mi>L</mi><mi>I</mi><mi>E</mi></mrow></math></span> is proposed to generate labels to alleviate the issue of overlapped influence spread. Moreover, a Mask mechanism specially tailored for the IM problem is presented along with an input embedding balancing strategy. The effectiveness of the GCNT model is demonstrated through comprehensive experiments conducted on six real-world networks, and the model shows its competitive performance in terms of both influence maximization and computational efficiency over state-of-the-art methods.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002726/pdfft?md5=fb687d0a26ab54db6f7c889e608384a1&pid=1-s2.0-S1319157824002726-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning-driven Data Fabric Trends and Challenges for cloud-to-thing continuum 学习驱动的数据架构趋势与挑战,实现从云到物的连续性
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 DOI: 10.1016/j.jksuci.2024.102145

This special issue is a collection of emerging trends and challenges in applying learning-driven approaches to data fabric architectures within the cloud-to-thing continuum. As data generation and processing increasingly occur at the edge, there is a growing need for intelligent, adaptive data management solutions that seamlessly operate across distributed environments. In this special issue, we received research contributions from various groups around the world. We chose the eight most appropriate and novel contributions to include in this special issue. These eight contributions were further categorized into three themes: Data Handling approaches, resource optimization and management, and security and attacks. Additionally, this editorial suggests future research directions that will potentially lead to groundbreaking insights, which could pave the way for a new era of learning techniques in Data Fabric and the Cloud-to-Thing Continuum.

本特刊汇集了在 "从云到物 "的连续统一体中将学习驱动方法应用于数据结构架构的新兴趋势和挑战。随着数据生成和处理越来越多地发生在边缘,人们越来越需要能够在分布式环境中无缝运行的智能、自适应数据管理解决方案。在本特刊中,我们收到了来自世界各地不同团体的研究成果。我们选择了八篇最合适、最新颖的论文纳入本特刊。这八篇论文被进一步分为三个主题:数据处理方法、资源优化与管理以及安全与攻击。此外,这篇社论还提出了未来的研究方向,这些方向可能会带来突破性的见解,为数据架构和云到物连续体学习技术的新时代铺平道路。
{"title":"Learning-driven Data Fabric Trends and Challenges for cloud-to-thing continuum","authors":"","doi":"10.1016/j.jksuci.2024.102145","DOIUrl":"10.1016/j.jksuci.2024.102145","url":null,"abstract":"<div><p>This special issue is a collection of emerging trends and challenges in applying learning-driven approaches to data fabric architectures within the cloud-to-thing continuum. As data generation and processing increasingly occur at the edge, there is a growing need for intelligent, adaptive data management solutions that seamlessly operate across distributed environments. In this special issue, we received research contributions from various groups around the world. We chose the eight most appropriate and novel contributions to include in this special issue. These eight contributions were further categorized into three themes: Data Handling approaches, resource optimization and management, and security and attacks. Additionally, this editorial suggests future research directions that will potentially lead to groundbreaking insights, which could pave the way for a new era of learning techniques in Data Fabric and the Cloud-to-Thing Continuum.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002349/pdfft?md5=286285bbd5dfa0b63dd8785bf5349c2e&pid=1-s2.0-S1319157824002349-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142230508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EETS: An energy-efficient task scheduler in cloud computing based on improved DQN algorithm EETS:基于改进的 DQN 算法的云计算高能效任务调度器
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-31 DOI: 10.1016/j.jksuci.2024.102177

The huge energy consumption of data centers in cloud computing leads to increased operating costs and high carbon emissions to the environment. Deep Reinforcement Learning (DRL) technology combines of deep learning and reinforcement learning, which has an obvious advantage in solving complex task scheduling problems. Deep Q Network(DQN)-based task scheduling has been employed for objective optimization. However, training the DQN algorithm may result in value overestimation, which can negatively impact the learning effectiveness. The replay buffer technique, while increasing sample utilization, does not distinguish between sample importance, resulting in limited utilization of valuable samples. This study proposes an enhanced task scheduling algorithm based on the DQN framework, which utilizes a more optimized Dueling-network architecture as well as Double DQN strategy to alleviate the overestimation bias and address the shortcomings of DQN. It also incorporates a prioritized experience replay technique to achieve importance sampling of experience data, which overcomes the problem of low utilization due to uniform sampling from replay memory. Based on these improved techniques, we developed an energy-efficient task scheduling algorithm called EETS (Energy-Efficient Task Scheduling). This algorithm automatically learns the optimal scheduling policy from historical data while interacting with the environment. Experimental results demonstrate that EETS exhibits faster convergence rates and higher rewards compared to both DQN and DDQN. In scheduling performance, EETS outperforms other baseline algorithms in key metrics, including energy consumption, average task response time, and average machine working time. Particularly, it has a significant advantage when handling large batches of tasks.

云计算中数据中心的巨大能耗导致运营成本增加,并对环境造成高碳排放。深度强化学习(DRL)技术结合了深度学习和强化学习,在解决复杂任务调度问题方面具有明显优势。基于深度 Q 网络(DQN)的任务调度已被用于目标优化。然而,训练 DQN 算法可能会导致值被高估,从而对学习效果产生负面影响。重放缓冲技术虽然能提高样本利用率,但无法区分样本的重要性,导致宝贵样本的利用率有限。本研究提出了一种基于 DQN 框架的增强型任务调度算法,利用更优化的 Dueling 网络架构和 Double DQN 策略来缓解高估偏差,解决 DQN 的不足。它还采用了优先经验重放技术来实现经验数据的重要性采样,从而克服了重放内存均匀采样导致的利用率低的问题。在这些改进技术的基础上,我们开发了一种名为 EETS(高能效任务调度)的高能效任务调度算法。该算法在与环境交互的过程中自动从历史数据中学习最优调度策略。实验结果表明,与 DQN 和 DDQN 相比,EETS 表现出更快的收敛速度和更高的回报率。在调度性能方面,EETS 在能耗、平均任务响应时间和平均机器工作时间等关键指标上都优于其他基准算法。尤其是在处理大批量任务时,EETS 具有明显优势。
{"title":"EETS: An energy-efficient task scheduler in cloud computing based on improved DQN algorithm","authors":"","doi":"10.1016/j.jksuci.2024.102177","DOIUrl":"10.1016/j.jksuci.2024.102177","url":null,"abstract":"<div><p>The huge energy consumption of data centers in cloud computing leads to increased operating costs and high carbon emissions to the environment. Deep Reinforcement Learning (DRL) technology combines of deep learning and reinforcement learning, which has an obvious advantage in solving complex task scheduling problems. Deep Q Network(DQN)-based task scheduling has been employed for objective optimization. However, training the DQN algorithm may result in value overestimation, which can negatively impact the learning effectiveness. The replay buffer technique, while increasing sample utilization, does not distinguish between sample importance, resulting in limited utilization of valuable samples. This study proposes an enhanced task scheduling algorithm based on the DQN framework, which utilizes a more optimized Dueling-network architecture as well as Double DQN strategy to alleviate the overestimation bias and address the shortcomings of DQN. It also incorporates a prioritized experience replay technique to achieve importance sampling of experience data, which overcomes the problem of low utilization due to uniform sampling from replay memory. Based on these improved techniques, we developed an energy-efficient task scheduling algorithm called EETS (Energy-Efficient Task Scheduling). This algorithm automatically learns the optimal scheduling policy from historical data while interacting with the environment. Experimental results demonstrate that EETS exhibits faster convergence rates and higher rewards compared to both DQN and DDQN. In scheduling performance, EETS outperforms other baseline algorithms in key metrics, including energy consumption, average task response time, and average machine working time. Particularly, it has a significant advantage when handling large batches of tasks.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002660/pdfft?md5=a86e26e6d8a0d8a013697db9338917a5&pid=1-s2.0-S1319157824002660-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of King Saud University-Computer and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1