首页 > 最新文献

Journal of King Saud University-Computer and Information Sciences最新文献

英文 中文
GCNT: Identify influential seed set effectively in social networks by integrating graph convolutional networks with graph transformers GCNT:通过将图卷积网络与图转换器整合,有效识别社交网络中具有影响力的种子集
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-10-01 Epub Date: 2024-09-02 DOI: 10.1016/j.jksuci.2024.102183
Jianxin Tang , Jitao Qu , Shihui Song , Zhili Zhao , Qian Du

Exploring effective and efficient strategies for identifying influential nodes from social networks as seeds to promote the propagation of influence remains a crucial challenge in the field of influence maximization (IM), which has attracted significant research efforts. Deep learning-based approaches have been adopted as an alternative promising solution to the IM problem. However, a robust model that captures the associations between network information and node influence needs to be investigated, while concurrently considering the effects of the overlapped influence on training labels. To address these challenges, a GCNT model, which integrates Graph Convolutional Networks with Graph Transformers, is introduced in this paper to capture the intricate relationships among the topology of the network, node attributes, and node influence effectively. Furthermore, an innovative method called Greedy-LIE is proposed to generate labels to alleviate the issue of overlapped influence spread. Moreover, a Mask mechanism specially tailored for the IM problem is presented along with an input embedding balancing strategy. The effectiveness of the GCNT model is demonstrated through comprehensive experiments conducted on six real-world networks, and the model shows its competitive performance in terms of both influence maximization and computational efficiency over state-of-the-art methods.

在影响力最大化(IM)领域,探索从社交网络中识别有影响力的节点作为种子以促进影响力传播的切实有效的策略仍然是一个重要挑战,吸引了大量研究人员的努力。基于深度学习的方法已被采用,作为解决 IM 问题的另一种有前途的方案。然而,需要研究一种能捕捉网络信息与节点影响力之间关联的稳健模型,同时考虑重叠影响力对训练标签的影响。为了应对这些挑战,本文引入了一个 GCNT 模型,该模型将图卷积网络与图变换器整合在一起,能有效捕捉网络拓扑、节点属性和节点影响力之间错综复杂的关系。此外,本文还提出了一种名为 "Greedy-LIE "的创新方法来生成标签,以缓解影响扩散重叠的问题。此外,还提出了专门针对 IM 问题的掩码机制以及输入嵌入平衡策略。通过在六个真实世界网络上进行的综合实验,证明了 GCNT 模型的有效性,而且该模型在影响力最大化和计算效率方面的表现都优于最先进的方法。
{"title":"GCNT: Identify influential seed set effectively in social networks by integrating graph convolutional networks with graph transformers","authors":"Jianxin Tang ,&nbsp;Jitao Qu ,&nbsp;Shihui Song ,&nbsp;Zhili Zhao ,&nbsp;Qian Du","doi":"10.1016/j.jksuci.2024.102183","DOIUrl":"10.1016/j.jksuci.2024.102183","url":null,"abstract":"<div><p>Exploring effective and efficient strategies for identifying influential nodes from social networks as seeds to promote the propagation of influence remains a crucial challenge in the field of influence maximization (IM), which has attracted significant research efforts. Deep learning-based approaches have been adopted as an alternative promising solution to the IM problem. However, a robust model that captures the associations between network information and node influence needs to be investigated, while concurrently considering the effects of the overlapped influence on training labels. To address these challenges, a GCNT model, which integrates Graph Convolutional Networks with Graph Transformers, is introduced in this paper to capture the intricate relationships among the topology of the network, node attributes, and node influence effectively. Furthermore, an innovative method called <span><math><mrow><mi>G</mi><mi>r</mi><mi>e</mi><mi>e</mi><mi>d</mi><mi>y</mi></mrow></math></span>-<span><math><mrow><mi>L</mi><mi>I</mi><mi>E</mi></mrow></math></span> is proposed to generate labels to alleviate the issue of overlapped influence spread. Moreover, a Mask mechanism specially tailored for the IM problem is presented along with an input embedding balancing strategy. The effectiveness of the GCNT model is demonstrated through comprehensive experiments conducted on six real-world networks, and the model shows its competitive performance in terms of both influence maximization and computational efficiency over state-of-the-art methods.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 8","pages":"Article 102183"},"PeriodicalIF":5.2,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002726/pdfft?md5=fb687d0a26ab54db6f7c889e608384a1&pid=1-s2.0-S1319157824002726-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142149684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Wear-Leveling-Aware Data Placement for LSM-Tree based key-value store on ZNS SSDs 基于 LSM 树的键值存储在 ZNS SSD 上的高效损耗平级感知数据放置
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 Epub Date: 2024-08-08 DOI: 10.1016/j.jksuci.2024.102156
Runyu Zhang, Lening Zhou, Mingjie Li, Yunlin Tan, Chaoshu Yang

Emerging Zoned Namespace (ZNS) is a new-style Solid State Drive (SSD) that manages data in a zoned manner, which can achieve higher performance by strictly obeying the sequential write mode in each zone and alleviating the redundant overhead of garbage collections. Unfortunately, flash memory usually has a serious problem with limited program/erase cycles. Meanwhile, inappropriate data placement strategy of storage systems can lead to imbalanced wear among zones, severely reducing the lifespan of ZNS SSDs. In this paper, we propose a Wear-Leveling-Aware Data Placement (WADP) to solve this problem with negligible performance cost. First, WADP employs a wear-aware empty zone allocation algorithm to quantify the resets of zones and choose the less-worn zone for each allocation. Second, to prevent long-term zone occupation of infrequently written data (namely cold data), we propose a wear-leveling cold zone monitoring mechanism to identify cold zones dynamically. Finally, WADP adopts a real-time I/O pressure-aware data migration mechanism to adaptively migrate cold data for achieving wear-leveling among zones. We implement the proposed WADP in ZenFS and evaluate it with widely used workloads. Compared with state-of-the-art solutions, i.e., LIZA and FAR, the experimental results show that WADP can significantly reduce the standard deviation of zone resets while maintaining decent performance.

新出现的分区命名空间(ZNS)是一种新型固态硬盘(SSD),它以分区方式管理数据,通过严格遵守各区的顺序写入模式,减轻垃圾回收的冗余开销,从而实现更高的性能。遗憾的是,闪存通常存在程序/擦除周期有限的严重问题。同时,存储系统不恰当的数据放置策略会导致各区之间的磨损不平衡,严重缩短 ZNS SSD 的使用寿命。在本文中,我们提出了一种可感知磨损的数据放置(WADP)来解决这一问题,其性能成本几乎可以忽略不计。首先,WADP 采用磨损感知空区分配算法来量化区的重置,并为每次分配选择磨损较少的区。其次,为防止不经常写入的数据(即冷数据)长期占用区域,我们提出了一种损耗水平冷区监控机制,以动态识别冷区。最后,WADP 采用实时 I/O 压力感知数据迁移机制,自适应地迁移冷数据,以实现区域间的损耗均衡。我们在 ZenFS 中实现了所提出的 WADP,并用广泛使用的工作负载对其进行了评估。实验结果表明,与最先进的解决方案(即 LIZA 和 FAR)相比,WADP 可以显著降低区域重置的标准偏差,同时保持良好的性能。
{"title":"Efficient Wear-Leveling-Aware Data Placement for LSM-Tree based key-value store on ZNS SSDs","authors":"Runyu Zhang,&nbsp;Lening Zhou,&nbsp;Mingjie Li,&nbsp;Yunlin Tan,&nbsp;Chaoshu Yang","doi":"10.1016/j.jksuci.2024.102156","DOIUrl":"10.1016/j.jksuci.2024.102156","url":null,"abstract":"<div><p>Emerging Zoned Namespace (ZNS) is a new-style Solid State Drive (SSD) that manages data in a zoned manner, which can achieve higher performance by strictly obeying the sequential write mode in each zone and alleviating the redundant overhead of garbage collections. Unfortunately, flash memory usually has a serious problem with limited program/erase cycles. Meanwhile, inappropriate data placement strategy of storage systems can lead to imbalanced wear among zones, severely reducing the lifespan of ZNS SSDs. In this paper, we propose a Wear-Leveling-Aware Data Placement (WADP) to solve this problem with negligible performance cost. First, WADP employs a wear-aware empty zone allocation algorithm to quantify the resets of zones and choose the less-worn zone for each allocation. Second, to prevent long-term zone occupation of infrequently written data (namely cold data), we propose a wear-leveling cold zone monitoring mechanism to identify cold zones dynamically. Finally, WADP adopts a real-time I/O pressure-aware data migration mechanism to adaptively migrate cold data for achieving wear-leveling among zones. We implement the proposed WADP in ZenFS and evaluate it with widely used workloads. Compared with state-of-the-art solutions, i.e., LIZA and FAR, the experimental results show that WADP can significantly reduce the standard deviation of zone resets while maintaining decent performance.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 7","pages":"Article 102156"},"PeriodicalIF":5.2,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002453/pdfft?md5=b3f5e8288e8205e799d78965f416b571&pid=1-s2.0-S1319157824002453-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142041102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning-driven Data Fabric Trends and Challenges for cloud-to-thing continuum 学习驱动的数据架构趋势与挑战,实现从云到物的连续性
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 Epub Date: 2024-07-30 DOI: 10.1016/j.jksuci.2024.102145
Praveen Kumar Donta , Chinmaya Kumar Dehury , Yu-Chen Hu

This special issue is a collection of emerging trends and challenges in applying learning-driven approaches to data fabric architectures within the cloud-to-thing continuum. As data generation and processing increasingly occur at the edge, there is a growing need for intelligent, adaptive data management solutions that seamlessly operate across distributed environments. In this special issue, we received research contributions from various groups around the world. We chose the eight most appropriate and novel contributions to include in this special issue. These eight contributions were further categorized into three themes: Data Handling approaches, resource optimization and management, and security and attacks. Additionally, this editorial suggests future research directions that will potentially lead to groundbreaking insights, which could pave the way for a new era of learning techniques in Data Fabric and the Cloud-to-Thing Continuum.

本特刊汇集了在 "从云到物 "的连续统一体中将学习驱动方法应用于数据结构架构的新兴趋势和挑战。随着数据生成和处理越来越多地发生在边缘,人们越来越需要能够在分布式环境中无缝运行的智能、自适应数据管理解决方案。在本特刊中,我们收到了来自世界各地不同团体的研究成果。我们选择了八篇最合适、最新颖的论文纳入本特刊。这八篇论文被进一步分为三个主题:数据处理方法、资源优化与管理以及安全与攻击。此外,这篇社论还提出了未来的研究方向,这些方向可能会带来突破性的见解,为数据架构和云到物连续体学习技术的新时代铺平道路。
{"title":"Learning-driven Data Fabric Trends and Challenges for cloud-to-thing continuum","authors":"Praveen Kumar Donta ,&nbsp;Chinmaya Kumar Dehury ,&nbsp;Yu-Chen Hu","doi":"10.1016/j.jksuci.2024.102145","DOIUrl":"10.1016/j.jksuci.2024.102145","url":null,"abstract":"<div><p>This special issue is a collection of emerging trends and challenges in applying learning-driven approaches to data fabric architectures within the cloud-to-thing continuum. As data generation and processing increasingly occur at the edge, there is a growing need for intelligent, adaptive data management solutions that seamlessly operate across distributed environments. In this special issue, we received research contributions from various groups around the world. We chose the eight most appropriate and novel contributions to include in this special issue. These eight contributions were further categorized into three themes: Data Handling approaches, resource optimization and management, and security and attacks. Additionally, this editorial suggests future research directions that will potentially lead to groundbreaking insights, which could pave the way for a new era of learning techniques in Data Fabric and the Cloud-to-Thing Continuum.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 7","pages":"Article 102145"},"PeriodicalIF":5.2,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002349/pdfft?md5=286285bbd5dfa0b63dd8785bf5349c2e&pid=1-s2.0-S1319157824002349-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142230508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A many-to-many matching with externalities solution for parallel task offloading in IoT networks 物联网网络并行任务卸载的多对多匹配与外部性解决方案
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 Epub Date: 2024-07-18 DOI: 10.1016/j.jksuci.2024.102134
Usman Mahmood Malik , Muhammad Awais Javed , Abdulaziz AlMohimeed , Mohammed Alkhathami , Deafallah Alsadie , Abeer Almujalli

The efficient and timely execution of tasks is a fundamental challenge in the realm of future Internet of Things (IoT) networks. To address this challenge, fog devices are often deployed close to end devices to facilitate task processing on behalf of IoT nodes. One strategy for improving task computational delay is to employ parallel task offloading, in which tasks are subdivided into subtasks and sent to different fog devices for execution in parallel. However, allocating computational resources to fog nodes and mapping these resources to IoT subtasks is a key challenge in this area. This work models the parallel task offloading problem as a graph-matching problem and utilizes a many-to-many matching technique to achieve a stable mapping of IoT subtasks to fog node resources. Unfortunately, the proposed solution is subject to the problem of externalities due to the dynamic preference profiling of fog nodes. To address this issue, we employ an iterative algorithm to resolve any blocking pairs that may arise. Our results demonstrate that the proposed technique reduces the task latency by 29% as compared to other matching-based techniques available in the literature.

高效及时地执行任务是未来物联网(IoT)网络领域的一项基本挑战。为应对这一挑战,通常会在终端设备附近部署雾设备,以促进代表物联网节点的任务处理。改善任务计算延迟的一种策略是采用并行任务卸载,即将任务细分为子任务,并发送到不同的雾设备并行执行。然而,为雾节点分配计算资源并将这些资源映射到物联网子任务是这一领域的关键挑战。这项工作将并行任务卸载问题建模为图匹配问题,并利用多对多匹配技术实现物联网子任务与雾节点资源的稳定映射。遗憾的是,由于雾节点的动态偏好剖析,所提出的解决方案存在外部性问题。为了解决这个问题,我们采用了一种迭代算法来解决可能出现的任何阻塞对。我们的研究结果表明,与文献中其他基于匹配的技术相比,所提出的技术可将任务延迟时间缩短 29%。
{"title":"A many-to-many matching with externalities solution for parallel task offloading in IoT networks","authors":"Usman Mahmood Malik ,&nbsp;Muhammad Awais Javed ,&nbsp;Abdulaziz AlMohimeed ,&nbsp;Mohammed Alkhathami ,&nbsp;Deafallah Alsadie ,&nbsp;Abeer Almujalli","doi":"10.1016/j.jksuci.2024.102134","DOIUrl":"10.1016/j.jksuci.2024.102134","url":null,"abstract":"<div><p>The efficient and timely execution of tasks is a fundamental challenge in the realm of future Internet of Things (IoT) networks. To address this challenge, fog devices are often deployed close to end devices to facilitate task processing on behalf of IoT nodes. One strategy for improving task computational delay is to employ parallel task offloading, in which tasks are subdivided into subtasks and sent to different fog devices for execution in parallel. However, allocating computational resources to fog nodes and mapping these resources to IoT subtasks is a key challenge in this area. This work models the parallel task offloading problem as a graph-matching problem and utilizes a many-to-many matching technique to achieve a stable mapping of IoT subtasks to fog node resources. Unfortunately, the proposed solution is subject to the problem of externalities due to the dynamic preference profiling of fog nodes. To address this issue, we employ an iterative algorithm to resolve any blocking pairs that may arise. Our results demonstrate that the proposed technique reduces the task latency by 29% as compared to other matching-based techniques available in the literature.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 7","pages":"Article 102134"},"PeriodicalIF":5.2,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002234/pdfft?md5=ca723de57705f68d89bad154b59605a4&pid=1-s2.0-S1319157824002234-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141960831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel image captioning model with visual-semantic similarities and visual representations re-weighting 具有视觉语义相似性和视觉表征重权的新型图像标题模型
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 Epub Date: 2024-07-14 DOI: 10.1016/j.jksuci.2024.102127
Alaa Thobhani , Beiji Zou , Xiaoyan Kui , Asma A. Al-Shargabi , Zaid Derea , Amr Abdussalam , Mohammed A. Asham

Image captioning, the task of generating descriptive sentences for images, has seen significant advancements by incorporating semantic information. However, previous studies employed semantic attribute detectors to extract predetermined attributes consistently applied at every time step, resulting in the use of irrelevant attributes to the linguistic context during words’ generation. Furthermore, the integration between semantic attributes and visual representations in previous works is considered superficial and ineffective, leading to the neglection of the rich visual-semantic connections affecting the captioning model’s performance. To address the limitations of previous models, we introduced a novel framework that adapts attribute usage based on contextual relevance and effectively utilizes the similarities between visual features and semantic attributes. Our framework includes an Attribute Detection Component (ADC) that predicts relevant attributes using visual features and attribute embeddings. The Attribute Prediction and Visual Weighting module (APVW) then dynamically adjusts these attributes and generates weights to refine the visual context vector, enhancing semantic alignment. Our approach demonstrated an average improvement of 3.30% in BLEU@1 and 5.24% in CIDEr on MS-COCO, and 6.55% in BLEU@1 and 25.72% in CIDEr on Flickr30K, during CIDEr optimization phase.

图像标题制作是为图像生成描述性句子的任务,通过纳入语义信息,图像标题制作取得了重大进展。然而,以往的研究采用语义属性检测器来提取预先确定的属性,并在每个时间步骤中持续应用,导致在生成词语时使用了与语言上下文无关的属性。此外,以往的研究认为语义属性和视觉表征之间的整合是肤浅和无效的,导致忽略了丰富的视觉-语义联系,影响了字幕模型的性能。为了解决以往模型的局限性,我们引入了一个新颖的框架,该框架可根据上下文相关性调整属性的使用,并有效利用视觉特征与语义属性之间的相似性。我们的框架包括一个属性检测组件(ADC),它能利用视觉特征和属性嵌入预测相关属性。然后,属性预测和视觉加权模块(APVW)会动态调整这些属性并生成权重,以完善视觉上下文向量,从而加强语义对齐。在 CIDEr 优化阶段,我们的方法在 MS-COCO 上平均提高了 3.30% 的 BLEU@1 和 5.24% 的 CIDEr,在 Flickr30K 上平均提高了 6.55% 的 BLEU@1 和 25.72% 的 CIDEr。
{"title":"A novel image captioning model with visual-semantic similarities and visual representations re-weighting","authors":"Alaa Thobhani ,&nbsp;Beiji Zou ,&nbsp;Xiaoyan Kui ,&nbsp;Asma A. Al-Shargabi ,&nbsp;Zaid Derea ,&nbsp;Amr Abdussalam ,&nbsp;Mohammed A. Asham","doi":"10.1016/j.jksuci.2024.102127","DOIUrl":"10.1016/j.jksuci.2024.102127","url":null,"abstract":"<div><p>Image captioning, the task of generating descriptive sentences for images, has seen significant advancements by incorporating semantic information. However, previous studies employed semantic attribute detectors to extract predetermined attributes consistently applied at every time step, resulting in the use of irrelevant attributes to the linguistic context during words’ generation. Furthermore, the integration between semantic attributes and visual representations in previous works is considered superficial and ineffective, leading to the neglection of the rich visual-semantic connections affecting the captioning model’s performance. To address the limitations of previous models, we introduced a novel framework that adapts attribute usage based on contextual relevance and effectively utilizes the similarities between visual features and semantic attributes. Our framework includes an Attribute Detection Component (ADC) that predicts relevant attributes using visual features and attribute embeddings. The Attribute Prediction and Visual Weighting module (APVW) then dynamically adjusts these attributes and generates weights to refine the visual context vector, enhancing semantic alignment. Our approach demonstrated an average improvement of 3.30% in BLEU@1 and 5.24% in CIDEr on MS-COCO, and 6.55% in BLEU@1 and 25.72% in CIDEr on Flickr30K, during CIDEr optimization phase.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 7","pages":"Article 102127"},"PeriodicalIF":5.2,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002167/pdfft?md5=a64ddf3f2ec61fdc99923155773d0fc6&pid=1-s2.0-S1319157824002167-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141712696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systematic review on software reliability prediction via swarm intelligence algorithms 通过蜂群智能算法预测软件可靠性的系统综述
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 Epub Date: 2024-07-20 DOI: 10.1016/j.jksuci.2024.102132
Li Sheng Kong , Muhammed Basheer Jasser , Samuel-Soma M. Ajibade , Ali Wagdy Mohamed

The widespread integration of software into all parts of our lives has led to the need for software of higher reliability. Ensuring reliable software usually necessitates some form of formal methods in the early stages of the development process which requires strenuous effort. Hence, researchers in the field of software reliability introduced Software Reliability Growth Models (SRGMs) as a relatively inexpensive approach to software reliability prediction. Conventional parameter estimation methods of SRGMs were ineffective and left more to be desired. Consequently, researchers sought out swarm intelligence to combat its flaws, resulting in significant improvements. While similar surveys exist within the domain, the surveys are broader in scope and do not cover many swarm intelligence algorithms. Moreover, the broader scope has resulted in the occasional omission of information regarding the design for reliability predictions. A more comprehensive survey containing 38 studies and 18 different swarm intelligence algorithms in the domain is presented. Each design proposed by the studies was systematically analyzed where relevant information including the measures used, datasets used, SRGMs used, and the effectiveness of each proposed design, were extracted and organized into tables and taxonomies to be able to identify the current trends within the domain. Some notable findings include the distance-based approach providing a high prediction accuracy and an increasing trend in hybridized variants of swarm intelligence algorithms designs to predict software reliability. Future researchers are encouraged to include Mean Square Error (MSE) or Root MSE as the measures offer the largest sample size for comparison.

随着软件广泛融入我们生活的方方面面,我们需要可靠性更高的软件。要确保软件的可靠性,通常需要在开发过程的早期阶段采用某种形式的正规方法,这需要付出艰苦的努力。因此,软件可靠性领域的研究人员引入了软件可靠性增长模型(SRGM),作为一种相对廉价的软件可靠性预测方法。传统的 SRGM 参数估计方法效果不佳,还有待改进。因此,研究人员寻找蜂群智能来克服其缺陷,从而取得了显著的改进。虽然该领域也有类似的调查,但调查范围更广,没有涵盖很多群智能算法。此外,由于范围较广,偶尔也会遗漏有关可靠性预测设计的信息。本文介绍了一项更为全面的调查,其中包含 38 项研究和 18 种不同的蜂群智能算法。对研究提出的每种设计都进行了系统分析,提取了相关信息,包括使用的测量方法、使用的数据集、使用的 SRGM 以及每种设计的有效性,并将其整理成表格和分类法,以便能够识别该领域的当前趋势。一些值得注意的发现包括:基于距离的方法可提供较高的预测准确性,以及预测软件可靠性的群集智能算法设计的混合变体呈上升趋势。我们鼓励未来的研究人员将均方误差 (MSE) 或根 MSE 纳入研究范围,因为这些指标提供了最大的样本量供比较。
{"title":"A systematic review on software reliability prediction via swarm intelligence algorithms","authors":"Li Sheng Kong ,&nbsp;Muhammed Basheer Jasser ,&nbsp;Samuel-Soma M. Ajibade ,&nbsp;Ali Wagdy Mohamed","doi":"10.1016/j.jksuci.2024.102132","DOIUrl":"10.1016/j.jksuci.2024.102132","url":null,"abstract":"<div><p>The widespread integration of software into all parts of our lives has led to the need for software of higher reliability. Ensuring reliable software usually necessitates some form of formal methods in the early stages of the development process which requires strenuous effort. Hence, researchers in the field of software reliability introduced Software Reliability Growth Models (SRGMs) as a relatively inexpensive approach to software reliability prediction. Conventional parameter estimation methods of SRGMs were ineffective and left more to be desired. Consequently, researchers sought out swarm intelligence to combat its flaws, resulting in significant improvements. While similar surveys exist within the domain, the surveys are broader in scope and do not cover many swarm intelligence algorithms. Moreover, the broader scope has resulted in the occasional omission of information regarding the design for reliability predictions. A more comprehensive survey containing 38 studies and 18 different swarm intelligence algorithms in the domain is presented. Each design proposed by the studies was systematically analyzed where relevant information including the measures used, datasets used, SRGMs used, and the effectiveness of each proposed design, were extracted and organized into tables and taxonomies to be able to identify the current trends within the domain. Some notable findings include the distance-based approach providing a high prediction accuracy and an increasing trend in hybridized variants of swarm intelligence algorithms designs to predict software reliability. Future researchers are encouraged to include Mean Square Error (MSE) or Root MSE as the measures offer the largest sample size for comparison.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 7","pages":"Article 102132"},"PeriodicalIF":5.2,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002210/pdfft?md5=65281963d468eb6753881c759697abc2&pid=1-s2.0-S1319157824002210-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141846519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A trust enhancement model based on distributed learning and blockchain in service ecosystems 服务生态系统中基于分布式学习和区块链的信任增强模型
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 Epub Date: 2024-07-30 DOI: 10.1016/j.jksuci.2024.102147
Chao Wang, Shizhan Chen, Hongyue Wu, Zhengxin Guo, Meng Xing, Zhiyong Feng

In a service ecosystem, the trust of users in services serves as the foundation for maintaining normal interactions among users, service providers, and platforms. However, malicious attacks can tamper with the trust value of these services, making it difficult for users to identify reliable services and undermining the benefits of reliable service providers and platforms. When existing trust management models address the impact of malicious attacks on service reliability, they rarely consider leveraging different attack targets to improve the accuracy of compromised service trust. Therefore, we propose a trust enhancement model based on distributed learning and blockchain in the service ecosystem, which adaptively enhances the trust values of compromised services according to the targets of anomalous attacks. Firstly, we conduct a comprehensive analysis of the targets of malicious attacks using distributed learning. Secondly, we introduced a trust enhancement contract that utilizes different methods to enhance the trust of the service based on various attack targets. Finally, our approach outperforms the baseline method significantly. For different attack targets, we observe a reduction in RMSE by 12.38% and 12.12%, respectively, and an enhancement in coverage by 24.94% and 14.56%, respectively. The experimental results show the reliability and efficacy of our proposed model.

在服务生态系统中,用户对服务的信任是维持用户、服务提供商和平台之间正常互动的基础。然而,恶意攻击会篡改这些服务的信任值,使用户难以识别可靠的服务,并损害可靠的服务提供商和平台的利益。现有的信任管理模型在解决恶意攻击对服务可靠性的影响时,很少考虑利用不同的攻击目标来提高受损服务信任的准确性。因此,我们提出了一种基于分布式学习和区块链的服务生态系统信任增强模型,该模型可根据异常攻击目标自适应地增强受损服务的信任值。首先,我们利用分布式学习对恶意攻击目标进行了全面分析。其次,我们引入了信任增强合约,根据不同的攻击目标利用不同的方法增强服务的信任度。最后,我们的方法明显优于基线方法。对于不同的攻击目标,我们观察到 RMSE 分别降低了 12.38% 和 12.12%,覆盖率分别提高了 24.94% 和 14.56%。实验结果表明了我们提出的模型的可靠性和有效性。
{"title":"A trust enhancement model based on distributed learning and blockchain in service ecosystems","authors":"Chao Wang,&nbsp;Shizhan Chen,&nbsp;Hongyue Wu,&nbsp;Zhengxin Guo,&nbsp;Meng Xing,&nbsp;Zhiyong Feng","doi":"10.1016/j.jksuci.2024.102147","DOIUrl":"10.1016/j.jksuci.2024.102147","url":null,"abstract":"<div><p>In a service ecosystem, the trust of users in services serves as the foundation for maintaining normal interactions among users, service providers, and platforms. However, malicious attacks can tamper with the trust value of these services, making it difficult for users to identify reliable services and undermining the benefits of reliable service providers and platforms. When existing trust management models address the impact of malicious attacks on service reliability, they rarely consider leveraging different attack targets to improve the accuracy of compromised service trust. Therefore, we propose a trust enhancement model based on distributed learning and blockchain in the service ecosystem, which adaptively enhances the trust values of compromised services according to the targets of anomalous attacks. Firstly, we conduct a comprehensive analysis of the targets of malicious attacks using distributed learning. Secondly, we introduced a trust enhancement contract that utilizes different methods to enhance the trust of the service based on various attack targets. Finally, our approach outperforms the baseline method significantly. For different attack targets, we observe a reduction in RMSE by 12.38% and 12.12%, respectively, and an enhancement in coverage by 24.94% and 14.56%, respectively. The experimental results show the reliability and efficacy of our proposed model.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 7","pages":"Article 102147"},"PeriodicalIF":5.2,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002362/pdfft?md5=dacd97c00d622b06f8f9a6dd3d5427f0&pid=1-s2.0-S1319157824002362-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141962797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structure recovery from single omnidirectional image with distortion-aware learning 利用失真感知学习从单幅全向图像中恢复结构
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 Epub Date: 2024-08-08 DOI: 10.1016/j.jksuci.2024.102151
Ming Meng , Yi Zhou , Dongshi Zuo , Zhaoxin Li , Zhong Zhou

Recovering structures from images with 180 or 360 FoV is pivotal in computer vision and computational photography, particularly for VR/AR/MR and autonomous robotics applications. Due to varying distortions and the complexity of indoor scenes, recovering flexible structures from a single image is challenging. We introduce OmniSRNet, a comprehensive deep learning framework that merges distortion-aware learning with bidirectional LSTM. Utilizing a curated dataset with optimized panorama and expanded fisheye images, our framework features a distortion-aware module (DAM) for extracting features and a horizontal and vertical step module (HVSM) of LSTM for contextual predictions. OmniSRNet excels in applications such as VR-based house viewing and MR-based video surveillance, achieving leading results on cuboid and non-cuboid datasets. The code and dataset can be accessed at https://github.com/mmlph/OmniSRNet/.

从 180∘ 或 360∘ FoV 的图像中恢复结构是计算机视觉和计算摄影的关键,尤其是在 VR/AR/MR 和自主机器人应用中。由于室内场景的畸变和复杂性各不相同,从单张图像中恢复灵活的结构具有挑战性。我们介绍了 OmniSRNet,这是一种综合深度学习框架,它将失真感知学习与双向 LSTM 相结合。利用包含优化全景和扩展鱼眼图像的数据集,我们的框架具有用于提取特征的失真感知模块(DAM)和用于上下文预测的 LSTM 水平和垂直阶跃模块(HVSM)。OmniSRNet 在基于 VR 的房屋查看和基于 MR 的视频监控等应用中表现出色,在立方体和非立方体数据集上取得了领先的结果。代码和数据集可通过 https://github.com/mmlph/OmniSRNet/ 访问。
{"title":"Structure recovery from single omnidirectional image with distortion-aware learning","authors":"Ming Meng ,&nbsp;Yi Zhou ,&nbsp;Dongshi Zuo ,&nbsp;Zhaoxin Li ,&nbsp;Zhong Zhou","doi":"10.1016/j.jksuci.2024.102151","DOIUrl":"10.1016/j.jksuci.2024.102151","url":null,"abstract":"<div><p>Recovering structures from images with 180<span><math><msup><mrow></mrow><mrow><mo>∘</mo></mrow></msup></math></span> or 360<span><math><msup><mrow></mrow><mrow><mo>∘</mo></mrow></msup></math></span> FoV is pivotal in computer vision and computational photography, particularly for VR/AR/MR and autonomous robotics applications. Due to varying distortions and the complexity of indoor scenes, recovering flexible structures from a single image is challenging. We introduce OmniSRNet, a comprehensive deep learning framework that merges distortion-aware learning with bidirectional LSTM. Utilizing a curated dataset with optimized panorama and expanded fisheye images, our framework features a distortion-aware module (DAM) for extracting features and a horizontal and vertical step module (HVSM) of LSTM for contextual predictions. OmniSRNet excels in applications such as VR-based house viewing and MR-based video surveillance, achieving leading results on cuboid and non-cuboid datasets. The code and dataset can be accessed at <span><span>https://github.com/mmlph/OmniSRNet/</span><svg><path></path></svg></span>.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 7","pages":"Article 102151"},"PeriodicalIF":5.2,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002404/pdfft?md5=7e463774b7098668fef54fdff2ad3e21&pid=1-s2.0-S1319157824002404-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142013028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of cloud resource allocation scheme with virtual machine inter-group asynchronous failure 带有虚拟机组间异步故障的云资源分配方案的性能分析
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 Epub Date: 2024-08-07 DOI: 10.1016/j.jksuci.2024.102155
Yuan Zhao , Kang Chen , Hongmin Gao , Yan Li

The recent rapid expansion of cloud computing has led to the prominence of Cloud Data Center (CDC) emerging. However, user requests’ waiting time might be greatly increased for a single physical machine (PM) in the CDC. We provide a cloud resource allocation scheme with virtual machine (VM) inter-group asynchronous failure. This method improves requests’ throughput and reduces wait time of requests. In particular, two PMs with different service rates for mapping multiple VMs are deployed in order to equally distribute cloud users’ requests, and we assume that the two PMs will fail and repair at different probabilities. A finite cache is also introduced to reduce the requests’ blocking rate. We model the VMs and user requests and create a 3-dimensional Markov chain (3DMC) to gauge the requests’ performance metrics. Numerical experiments are performed to obtain multiple performance metrics graphs for the requests. By comparing our scheme with the traditional cloud resource allocation scheme that involves synchronization failure in VM, we find that our scheme has an improvement in throughput, and each scheme has advantages and disadvantages in blocking rate of requests.

近年来,云计算的迅速发展使云数据中心(CDC)崭露头角。然而,对于云数据中心中的单个物理机(PM)来说,用户请求的等待时间可能会大大增加。我们提供了一种虚拟机(VM)组间异步故障的云资源分配方案。这种方法提高了请求的吞吐量,减少了请求的等待时间。特别是,为了平均分配云用户的请求,我们部署了两个具有不同服务速率的 PM 来映射多个虚拟机,并假设这两个 PM 将以不同的概率发生故障和修复。我们还引入了有限缓存,以降低请求阻塞率。我们对虚拟机和用户请求进行建模,并创建一个三维马尔可夫链(3DMC)来衡量请求的性能指标。通过数值实验,我们获得了请求的多个性能指标图。通过将我们的方案与涉及虚拟机同步故障的传统云资源分配方案进行比较,我们发现我们的方案在吞吐量方面有所改善,而且两种方案在请求阻塞率方面各有利弊。
{"title":"Performance analysis of cloud resource allocation scheme with virtual machine inter-group asynchronous failure","authors":"Yuan Zhao ,&nbsp;Kang Chen ,&nbsp;Hongmin Gao ,&nbsp;Yan Li","doi":"10.1016/j.jksuci.2024.102155","DOIUrl":"10.1016/j.jksuci.2024.102155","url":null,"abstract":"<div><p>The recent rapid expansion of cloud computing has led to the prominence of Cloud Data Center (CDC) emerging. However, user requests’ waiting time might be greatly increased for a single physical machine (PM) in the CDC. We provide a cloud resource allocation scheme with virtual machine (VM) inter-group asynchronous failure. This method improves requests’ throughput and reduces wait time of requests. In particular, two PMs with different service rates for mapping multiple VMs are deployed in order to equally distribute cloud users’ requests, and we assume that the two PMs will fail and repair at different probabilities. A finite cache is also introduced to reduce the requests’ blocking rate. We model the VMs and user requests and create a 3-dimensional Markov chain (3DMC) to gauge the requests’ performance metrics. Numerical experiments are performed to obtain multiple performance metrics graphs for the requests. By comparing our scheme with the traditional cloud resource allocation scheme that involves synchronization failure in VM, we find that our scheme has an improvement in throughput, and each scheme has advantages and disadvantages in blocking rate of requests.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 7","pages":"Article 102155"},"PeriodicalIF":5.2,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002441/pdfft?md5=d0b96a172006c37607e17d7e394616cf&pid=1-s2.0-S1319157824002441-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Diverse representation-guided graph learning for multi-view metric clustering 多视角度量聚类的多元表征引导图学习
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-01 Epub Date: 2024-07-24 DOI: 10.1016/j.jksuci.2024.102129
Xiaoshuang Sang, Yang Zou, Feng Li, Ranran He

Multi-view graph clustering has garnered tremendous interest for its capability to effectively segregate data by harnessing information from multiple graphs representing distinct views. Despite the advances, conventional methods commonly construct similarity graphs straightway from raw features, leading to suboptimal outcomes due to noise or outliers. To address this, latent representation-based graph clustering has emerged. However, it often hypothesizes that multiple views share a fixed-dimensional coefficient matrix, potentially resulting in useful information loss and limited representation capabilities. Additionally, many methods exploit Euclidean distance as a similarity metric, which may inaccurately measure linear relationships between samples. To tackle these challenges, we develop a novel diverse representation-guided graph learning for multi-view metric clustering (DRGMMC). Concretely, raw sample matrix from each view is first projected into diverse latent spaces to capture comprehensive knowledge. Subsequently, a popular metric is leveraged to adaptively learn similarity graphs with linearity-aware based on attained coefficient matrices. Furthermore, a self-weighted fusion strategy and Laplacian rank constraint are introduced to output clustering results directly. Consequently, our model merges diverse representation learning, metric learning, consensus graph learning, and data clustering into a joint model, reinforcing each other for holistic optimization. Substantial experimental findings substantiate that DRGMMC outperforms most advanced graph clustering techniques.

多视图聚类能够通过利用代表不同视图的多个图形中的信息来有效地分离数据,因而引起了人们的极大兴趣。尽管取得了进步,但传统方法通常直接从原始特征构建相似性图,由于噪声或异常值的存在,导致结果不理想。为了解决这个问题,出现了基于潜在表示的图形聚类。然而,这种方法通常假设多个视图共享一个固定维度的系数矩阵,可能会造成有用信息的损失和有限的表示能力。此外,许多方法利用欧氏距离作为相似性度量,这可能会不准确地衡量样本之间的线性关系。为了应对这些挑战,我们开发了一种新颖的多视图度量聚类(DRGMMC)的多样化表示引导图学习方法。具体来说,首先将每个视图的原始样本矩阵投射到不同的潜在空间,以获取全面的知识。然后,利用一种流行的度量方法,基于获得的系数矩阵,自适应地学习具有线性感知的相似性图。此外,我们还引入了自加权融合策略和拉普拉斯秩约束,以直接输出聚类结果。因此,我们的模型将不同的表示学习、度量学习、共识图学习和数据聚类合并成一个联合模型,相互促进,实现整体优化。大量实验结果证明,DRGMMC 优于大多数先进的图聚类技术。
{"title":"Diverse representation-guided graph learning for multi-view metric clustering","authors":"Xiaoshuang Sang,&nbsp;Yang Zou,&nbsp;Feng Li,&nbsp;Ranran He","doi":"10.1016/j.jksuci.2024.102129","DOIUrl":"10.1016/j.jksuci.2024.102129","url":null,"abstract":"<div><p>Multi-view graph clustering has garnered tremendous interest for its capability to effectively segregate data by harnessing information from multiple graphs representing distinct views. Despite the advances, conventional methods commonly construct similarity graphs straightway from raw features, leading to suboptimal outcomes due to noise or outliers. To address this, latent representation-based graph clustering has emerged. However, it often hypothesizes that multiple views share a fixed-dimensional coefficient matrix, potentially resulting in useful information loss and limited representation capabilities. Additionally, many methods exploit Euclidean distance as a similarity metric, which may inaccurately measure linear relationships between samples. To tackle these challenges, we develop a novel diverse representation-guided graph learning for multi-view metric clustering (DRGMMC). Concretely, raw sample matrix from each view is first projected into diverse latent spaces to capture comprehensive knowledge. Subsequently, a popular metric is leveraged to adaptively learn similarity graphs with linearity-aware based on attained coefficient matrices. Furthermore, a self-weighted fusion strategy and Laplacian rank constraint are introduced to output clustering results directly. Consequently, our model merges diverse representation learning, metric learning, consensus graph learning, and data clustering into a joint model, reinforcing each other for holistic optimization. Substantial experimental findings substantiate that DRGMMC outperforms most advanced graph clustering techniques.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 7","pages":"Article 102129"},"PeriodicalIF":5.2,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002180/pdfft?md5=7f0dd8a20b2ca00d3561c9fb487ffc79&pid=1-s2.0-S1319157824002180-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141838749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of King Saud University-Computer and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1