首页 > 最新文献

Journal of Supercomputing最新文献

英文 中文
Automatic detection of depression symptoms in twitter using multimodal analysis. 使用多模态分析自动检测推特中的抑郁症状。
IF 2.5 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-01-01 Epub Date: 2021-09-09 DOI: 10.1007/s11227-021-04040-8
Ramin Safa, Peyman Bayat, Leila Moghtader

Depression is the most prevalent mental disorder that can lead to suicide. Due to the tendency of people to share their thoughts on social platforms, social data contain valuable information that can be used to identify user's psychological states. In this paper, we provide an automated approach to collect and evaluate tweets based on self-reported statements and present a novel multimodal framework to predict depression symptoms from user profiles. We used n-gram language models, LIWC dictionaries, automatic image tagging, and bag-of-visual-words. We consider the correlation-based feature selection and nine different classifiers with standard evaluation metrics to assess the effectiveness of the method. Based on the analysis, the tweets and bio-text alone showed 91% and 83% accuracy in predicting depressive symptoms, respectively, which seems to be an acceptable result. We also believe performance improvements can be achieved by limiting the user domain or presence of clinical information.

抑郁症是最常见的可导致自杀的精神障碍。由于人们倾向于在社交平台上分享自己的想法,社交数据包含有价值的信息,可以用来识别用户的心理状态。在本文中,我们提供了一种基于自我报告声明的自动收集和评估推文的方法,并提出了一种新的多模式框架,用于从用户档案中预测抑郁症状。我们使用了n-gram语言模型、LIWC词典、自动图像标记和视觉单词袋。我们考虑了基于相关性的特征选择和具有标准评估指标的九个不同分类器来评估该方法的有效性。根据分析,仅推特和个人简介在预测抑郁症状方面的准确率分别为91%和83%,这似乎是一个可以接受的结果。我们还认为,可以通过限制用户域或临床信息的存在来实现性能改进。
{"title":"Automatic detection of depression symptoms in twitter using multimodal analysis.","authors":"Ramin Safa, Peyman Bayat, Leila Moghtader","doi":"10.1007/s11227-021-04040-8","DOIUrl":"10.1007/s11227-021-04040-8","url":null,"abstract":"<p><p>Depression is the most prevalent mental disorder that can lead to suicide. Due to the tendency of people to share their thoughts on social platforms, social data contain valuable information that can be used to identify user's psychological states. In this paper, we provide an automated approach to collect and evaluate tweets based on self-reported statements and present a novel multimodal framework to predict depression symptoms from user profiles. We used n-gram language models, LIWC dictionaries, automatic image tagging, and bag-of-visual-words. We consider the correlation-based feature selection and nine different classifiers with standard evaluation metrics to assess the effectiveness of the method. Based on the analysis, the tweets and bio-text alone showed 91% and 83% accuracy in predicting depressive symptoms, respectively, which seems to be an acceptable result. We also believe performance improvements can be achieved by limiting the user domain or presence of clinical information.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":"78 4","pages":"4709-4744"},"PeriodicalIF":2.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8426595/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39414694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new approach for physical human activity recognition based on co-occurrence matrices. 基于共现矩阵的人体运动识别新方法。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-01-01 Epub Date: 2021-06-04 DOI: 10.1007/s11227-021-03921-2
Fatma Kuncan, Yılmaz Kaya, Ramazan Tekin, Melih Kuncan

In recent years, it has been observed that many researchers have been working on different areas of detection, recognition and monitoring of human activities. The automatic determination of human physical activities is often referred to as human activity recognition (HAR). One of the most important technology that detects and tracks the activity of the human body is sensor-based HAR technology. In recent days, sensor-based HAR attracts attention in the field of computers due to its wide use in daily life and is a rapidly growing field of research. Activity recognition (AR) application is carried out by evaluating the signals obtained from various sensors placed in the human body. In this study, a new approach is proposed to extract features from sensor signals using HAR. The proposed approach is inspired by the Gray Level Co-Occurrence Matrix (GLCM) method, which is widely used in image processing, but it is applied to one-dimensional signals, unlike GLCM. Two datasets were used to test the proposed approach. The datasets were created from the signals obtained from the accelerometer, gyro and magnetometer sensors. Heralick features were obtained from co-occurrence matrix created after 1D-GLCM (One (1) Dimensional-Gray Level Co-Occurrence Matrix) was applied to the signals. HAR operation has been carried out for different scenarios using these features. Success rates of 96.66 and 93.88% were obtained for two datasets, respectively. It has been observed that the new approach proposed within the scope of the study provides high success rates for HAR applications. It is thought that the proposed approach can be used in the classification of different signals.

近年来,人们注意到许多研究人员一直在研究人类活动的检测、识别和监测的不同领域。人类身体活动的自动测定通常被称为人类活动识别(HAR)。检测和跟踪人体活动的最重要的技术之一是基于传感器的HAR技术。近年来,基于传感器的HAR因其在日常生活中的广泛应用而受到计算机领域的关注,是一个快速发展的研究领域。活动识别(AR)应用是通过评估从放置在人体中的各种传感器获得的信号来进行的。本文提出了一种利用HAR提取传感器信号特征的新方法。该方法受到灰度共生矩阵(GLCM)方法的启发,该方法在图像处理中广泛使用,但与GLCM不同,它适用于一维信号。使用两个数据集来测试所提出的方法。数据集是根据加速度计、陀螺仪和磁力计传感器获得的信号创建的。利用一维灰度共生矩阵(1D-GLCM, One (1) Dimensional-Gray - Level co-occurrence matrix)对信号进行处理后生成的共生矩阵获得纹章特征。HAR操作已经在使用这些特性的不同场景中执行。两个数据集的成功率分别为96.66%和93.88%。据观察,在研究范围内提出的新方法为HAR应用提供了高成功率。认为该方法可用于不同信号的分类。
{"title":"A new approach for physical human activity recognition based on co-occurrence matrices.","authors":"Fatma Kuncan,&nbsp;Yılmaz Kaya,&nbsp;Ramazan Tekin,&nbsp;Melih Kuncan","doi":"10.1007/s11227-021-03921-2","DOIUrl":"https://doi.org/10.1007/s11227-021-03921-2","url":null,"abstract":"<p><p>In recent years, it has been observed that many researchers have been working on different areas of detection, recognition and monitoring of human activities. The automatic determination of human physical activities is often referred to as human activity recognition (HAR). One of the most important technology that detects and tracks the activity of the human body is sensor-based HAR technology. In recent days, sensor-based HAR attracts attention in the field of computers due to its wide use in daily life and is a rapidly growing field of research. Activity recognition (AR) application is carried out by evaluating the signals obtained from various sensors placed in the human body. In this study, a new approach is proposed to extract features from sensor signals using HAR. The proposed approach is inspired by the Gray Level Co-Occurrence Matrix (GLCM) method, which is widely used in image processing, but it is applied to one-dimensional signals, unlike GLCM. Two datasets were used to test the proposed approach. The datasets were created from the signals obtained from the accelerometer, gyro and magnetometer sensors. Heralick features were obtained from co-occurrence matrix created after 1D-GLCM (One (1) Dimensional-Gray Level Co-Occurrence Matrix) was applied to the signals. HAR operation has been carried out for different scenarios using these features. Success rates of 96.66 and 93.88% were obtained for two datasets, respectively. It has been observed that the new approach proposed within the scope of the study provides high success rates for HAR applications. It is thought that the proposed approach can be used in the classification of different signals.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":"78 1","pages":"1048-1070"},"PeriodicalIF":3.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11227-021-03921-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39075829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of agricultural exports based on deep learning and text mining. 基于深度学习和文本挖掘的农产品出口分析。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-01-01 Epub Date: 2022-02-01 DOI: 10.1007/s11227-021-04238-w
Jia-Lang Xu, Ying-Lin Hsu

Agricultural exports are an important source of economic profit for many countries. Accurate predictions of a country's agricultural exports month on month are key to understanding a country's domestic use and export figures and facilitate advance planning of export, import, and domestic use figures and the resulting necessary adjustments of production and marketing. This study proposes a novel method for predicting the rise and fall of agricultural exports, called agricultural exports time series-long short-term memory (AETS-LSTM). The method applies Jieba word segmentation and Word2Vec to train word vectors and uses TF-IDF and word cloud to learn news-related keywords and finally obtain keyword vectors. This research explores whether the purchasing managers' index (PMI) of each industry can effectively use the AETS-LSTM model to predict the rise and fall of agricultural exports. Research results show that the inclusion of keyword vectors in the PMI values of the finance and insurance industries has a relative impact on the prediction of the rise and fall of agricultural exports, which can improve the prediction accuracy for the rise and fall of agricultural exports by 82.61%. The proposed method achieves improved prediction ability for the chemical/biological/medical, transportation equipment, wholesale, finance and insurance, food and textiles, basic materials, education/professional, science/technical, information/communications/broadcasting, transportation and storage, retail, and electrical and machinery equipment categories, while its performance for the electrical and optical categories shows improved prediction by combining keyword vectors, and its accuracy for the accommodation and food service, and construction and real estate industries remained unchanged. Therefore, the proposed method offers improved prediction capacity for agricultural exports month on month, allowing agribusiness operators and policy makers to evaluate and adjust domestic and foreign production and sales.

农产品出口是许多国家经济利润的重要来源。准确预测一个国家每月的农产品出口是了解一个国家国内使用和出口数据的关键,有助于提前规划出口、进口和国内使用数据以及由此产生的必要的产销调整。本研究提出了一种预测农产品出口增减的新方法——农产品出口时间序列-长短期记忆(AETS-LSTM)。该方法利用Jieba分词和Word2Vec训练词向量,利用TF-IDF和词云学习新闻相关关键词,最终获得关键词向量。本研究探讨了各个行业的采购经理人指数(PMI)是否能够有效地利用AETS-LSTM模型预测农产品出口的涨跌。研究结果表明,将关键词向量纳入金融保险业PMI值对农产品出口兴衰预测有相对影响,可将农产品出口兴衰预测准确率提高82.61%。该方法对化工/生物/医疗、交通运输设备、批发、金融保险、食品纺织、基础材料、教育/专业、科学/技术、信息/通信/广播、交通运输仓储、零售、电气和机械设备等类别的预测能力有所提高,对电气和光学类别的预测能力通过组合关键词向量有所提高。住宿和餐饮服务、建筑和房地产行业的准确性保持不变。因此,该方法提高了对农产品出口的逐月预测能力,使农业企业经营者和政策制定者能够评估和调整国内外的生产和销售。
{"title":"Analysis of agricultural exports based on deep learning and text mining.","authors":"Jia-Lang Xu,&nbsp;Ying-Lin Hsu","doi":"10.1007/s11227-021-04238-w","DOIUrl":"https://doi.org/10.1007/s11227-021-04238-w","url":null,"abstract":"<p><p>Agricultural exports are an important source of economic profit for many countries. Accurate predictions of a country's agricultural exports month on month are key to understanding a country's domestic use and export figures and facilitate advance planning of export, import, and domestic use figures and the resulting necessary adjustments of production and marketing. This study proposes a novel method for predicting the rise and fall of agricultural exports, called agricultural exports time series-long short-term memory (AETS-LSTM). The method applies Jieba word segmentation and Word2Vec to train word vectors and uses TF-IDF and word cloud to learn news-related keywords and finally obtain keyword vectors. This research explores whether the purchasing managers' index (PMI) of each industry can effectively use the AETS-LSTM model to predict the rise and fall of agricultural exports. Research results show that the inclusion of keyword vectors in the PMI values of the finance and insurance industries has a relative impact on the prediction of the rise and fall of agricultural exports, which can improve the prediction accuracy for the rise and fall of agricultural exports by 82.61%. The proposed method achieves improved prediction ability for the chemical/biological/medical, transportation equipment, wholesale, finance and insurance, food and textiles, basic materials, education/professional, science/technical, information/communications/broadcasting, transportation and storage, retail, and electrical and machinery equipment categories, while its performance for the electrical and optical categories shows improved prediction by combining keyword vectors, and its accuracy for the accommodation and food service, and construction and real estate industries remained unchanged. Therefore, the proposed method offers improved prediction capacity for agricultural exports month on month, allowing agribusiness operators and policy makers to evaluate and adjust domestic and foreign production and sales.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":"78 8","pages":"10876-10892"},"PeriodicalIF":3.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8804672/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39893695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Smart city information processing under internet of things and cloud computing. 物联网和云计算下的智慧城市信息处理。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-01-01 Epub Date: 2021-08-03 DOI: 10.1007/s11227-021-03972-5
Peng Su, Yuanyuan Chen, Mengmeng Lu

This study is to explore the smart city information (SCI) processing technology based on the Internet of Things (IoT) and cloud computing, promoting the construction of smart cities in the direction of effective sharing and interconnection. In this study, a SCI system is constructed based on the information islands in the smart construction of various fields in smart cities. The smart environment monitoring, smart transportation, and smart epidemic prevention at the application layer of the SCI system are designed separately. A multi-objective optimization algorithm for cloud computing virtual machine resource allocation method (CC-VMRA method) is proposed, and the application of the IoT and cloud computing technology in the smart city information system is further analysed and simulated for the performance verification. The results show that the multi-objective optimization algorithm in the CC-VMRA method can greatly reduce the number of physical servers in the SCI system (less than 20), and the variance is not higher than 0.0024, which can enable the server cluster to achieve better load balancing effects. In addition, the packet loss rate of the Zigbee protocol used by the IoT gateway in the SCI system is far below the 0.1% indicator, and the delay is less than 10 ms. Therefore, the SCI system constructed by this study shows low latency and high utilization rate, which can provide experimental reference for the later construction of smart city.

本研究旨在探索基于物联网(IoT)和云计算的智慧城市信息(SCI)处理技术,推动智慧城市建设朝着有效共享和互联的方向发展。本研究基于智慧城市各领域智慧建设中的信息孤岛,构建了一个SCI系统。分别对SCI系统应用层的智能环境监测、智能交通、智能防疫进行了设计。提出了一种云计算虚拟机资源分配方法(CC-VMRA方法)的多目标优化算法,并进一步分析和仿真了物联网和云计算技术在智慧城市信息系统中的应用,进行了性能验证。结果表明,CC-VMRA方法中的多目标优化算法可以大大减少SCI系统中的物理服务器数量(小于20台),且方差不高于0.0024,可以使服务器集群达到较好的负载均衡效果。此外,物联网网关在SCI系统中使用的Zigbee协议丢包率远低于0.1%指标,时延小于10ms。因此,本研究构建的SCI系统具有低时延、高利用率的特点,可为智慧城市的后期建设提供实验参考。
{"title":"Smart city information processing under internet of things and cloud computing.","authors":"Peng Su,&nbsp;Yuanyuan Chen,&nbsp;Mengmeng Lu","doi":"10.1007/s11227-021-03972-5","DOIUrl":"https://doi.org/10.1007/s11227-021-03972-5","url":null,"abstract":"<p><p>This study is to explore the smart city information (SCI) processing technology based on the Internet of Things (IoT) and cloud computing, promoting the construction of smart cities in the direction of effective sharing and interconnection. In this study, a SCI system is constructed based on the information islands in the smart construction of various fields in smart cities. The smart environment monitoring, smart transportation, and smart epidemic prevention at the application layer of the SCI system are designed separately. A multi-objective optimization algorithm for cloud computing virtual machine resource allocation method (CC-VMRA method) is proposed, and the application of the IoT and cloud computing technology in the smart city information system is further analysed and simulated for the performance verification. The results show that the multi-objective optimization algorithm in the CC-VMRA method can greatly reduce the number of physical servers in the SCI system (less than 20), and the variance is not higher than 0.0024, which can enable the server cluster to achieve better load balancing effects. In addition, the packet loss rate of the Zigbee protocol used by the IoT gateway in the SCI system is far below the 0.1% indicator, and the delay is less than 10 ms. Therefore, the SCI system constructed by this study shows low latency and high utilization rate, which can provide experimental reference for the later construction of smart city.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":"78 3","pages":"3676-3695"},"PeriodicalIF":3.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11227-021-03972-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39290910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Development of a yoga posture coaching system using an interactive display based on transfer learning. 基于迁移学习的交互式显示瑜伽姿势训练系统的开发。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-01-01 Epub Date: 2021-09-20 DOI: 10.1007/s11227-021-04076-w
Chhaihuoy Long, Eunhye Jo, Yunyoung Nam

Yoga is a form of exercise that is beneficial for health, focusing on physical, mental, and spiritual connections. However, practicing yoga and adopting incorrect postures can cause health problems, such as muscle sprains and pain. In this study, we propose the development of a yoga posture coaching system using an interactive display, based on a transfer learning technique. The 14 different yoga postures were collected from an RGB camera, and eight participants were required to perform each yoga posture 10 times. Data augmentation was applied to oversample and prevent over-fitting of the training datasets. Six transfer learning models (TL-VGG16-DA, TL-VGG19-DA, TL-MobileNet-DA, TL-MobileNetV2-DA, TL-InceptionV3-DA, and TL-DenseNet201-DA) were exploited for classification tasks to select the optimal model for the yoga coaching system, based on evaluation metrics. As a result, the TL-MobileNet-DA model was selected as the optimal model, showing an overall accuracy of 98.43%, sensitivity of 98.30%, specificity of 99.88%, and Matthews correlation coefficient of 0.9831. The study presented a yoga posture coaching system that recognized the yoga posture movement of users, in real time, according to the selected yoga posture guidance and can coach them to avoid incorrect postures.

瑜伽是一种有益健康的运动形式,专注于身体、心理和精神上的联系。然而,练习瑜伽和采取不正确的姿势会导致健康问题,比如肌肉扭伤和疼痛。在这项研究中,我们提出了一个基于迁移学习技术的瑜伽姿势训练系统的开发,该系统使用交互式显示。研究人员通过RGB相机收集了14种不同的瑜伽姿势,并要求8名参与者每种瑜伽姿势做10次。数据扩充应用于过采样和防止训练数据集的过拟合。利用6个迁移学习模型(TL-VGG16-DA、TL-VGG19-DA、TL-MobileNet-DA、TL-MobileNetV2-DA、TL-InceptionV3-DA和TL-DenseNet201-DA)进行分类任务,根据评价指标为瑜伽教练系统选择最优模型。最终选择TL-MobileNet-DA模型作为最优模型,整体准确率为98.43%,灵敏度为98.30%,特异性为99.88%,Matthews相关系数为0.9831。本研究提出了一种瑜伽姿势指导系统,可以实时识别用户的瑜伽姿势动作,并根据所选择的瑜伽姿势指导,指导用户避免错误的姿势。
{"title":"Development of a yoga posture coaching system using an interactive display based on transfer learning.","authors":"Chhaihuoy Long,&nbsp;Eunhye Jo,&nbsp;Yunyoung Nam","doi":"10.1007/s11227-021-04076-w","DOIUrl":"https://doi.org/10.1007/s11227-021-04076-w","url":null,"abstract":"<p><p>Yoga is a form of exercise that is beneficial for health, focusing on physical, mental, and spiritual connections. However, practicing yoga and adopting incorrect postures can cause health problems, such as muscle sprains and pain. In this study, we propose the development of a yoga posture coaching system using an interactive display, based on a transfer learning technique. The 14 different yoga postures were collected from an RGB camera, and eight participants were required to perform each yoga posture 10 times. Data augmentation was applied to oversample and prevent over-fitting of the training datasets. Six transfer learning models (TL-VGG16-DA, TL-VGG19-DA, TL-MobileNet-DA, TL-MobileNetV2-DA, TL-InceptionV3-DA, and TL-DenseNet201-DA) were exploited for classification tasks to select the optimal model for the yoga coaching system, based on evaluation metrics. As a result, the TL-MobileNet-DA model was selected as the optimal model, showing an overall accuracy of 98.43%, sensitivity of 98.30%, specificity of 99.88%, and Matthews correlation coefficient of 0.9831. The study presented a yoga posture coaching system that recognized the yoga posture movement of users, in real time, according to the selected yoga posture guidance and can coach them to avoid incorrect postures.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":"78 4","pages":"5269-5284"},"PeriodicalIF":3.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8451169/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39451307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Structural break-aware pairs trading strategy using deep reinforcement learning. 利用深度强化学习的结构突破感知对交易策略。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-01-01 Epub Date: 2021-08-17 DOI: 10.1007/s11227-021-04013-x
Jing-You Lu, Hsu-Chao Lai, Wen-Yueh Shih, Yi-Feng Chen, Shen-Hang Huang, Hao-Han Chang, Jun-Zhe Wang, Jiun-Long Huang, Tian-Shyr Dai

Pairs trading is an effective statistical arbitrage strategy considering the spread of paired stocks in a stable cointegration relationship. Nevertheless, rapid market changes may break the relationship (namely structural break), which further leads to tremendous loss in intraday trading. In this paper, we design a two-phase pairs trading strategy optimization framework, namely structural break-aware pairs trading strategy (SAPT), by leveraging machine learning techniques. Phase one is a hybrid model extracting frequency- and time-domain features to detect structural breaks. Phase two optimizes pairs trading strategy by sensing important risks, including structural breaks and market-closing risks, with a novel reinforcement learning model. In addition, the transaction cost is factored in a cost-aware objective to avoid significant reduction of profitability. Through large-scale experiments in real Taiwan stock market datasets, SAPT outperforms the state-of-the-art strategies by at least 456% and 934% in terms of profit and Sortino ratio, respectively.

考虑到配对股票的价差具有稳定的协整关系,配对交易是一种有效的统计套利策略。然而,市场的快速变化可能会打破这种关系(即结构性断裂),从而进一步导致日内交易的巨大损失。在本文中,我们利用机器学习技术设计了一个两阶段的配对交易策略优化框架,即结构性断裂感知配对交易策略(SAPT)。第一阶段是一个混合模型,提取频域和时域特征来检测结构断裂。第二阶段利用新颖的强化学习模型,通过感知重要风险(包括结构性中断和市场关闭风险)来优化配对交易策略。此外,还将交易成本纳入成本感知目标,以避免盈利能力大幅下降。通过在真实的台湾股市数据集上进行大规模实验,SAPT 在利润和 Sortino 比率方面分别比最先进的策略高出至少 456% 和 934%。
{"title":"Structural break-aware pairs trading strategy using deep reinforcement learning.","authors":"Jing-You Lu, Hsu-Chao Lai, Wen-Yueh Shih, Yi-Feng Chen, Shen-Hang Huang, Hao-Han Chang, Jun-Zhe Wang, Jiun-Long Huang, Tian-Shyr Dai","doi":"10.1007/s11227-021-04013-x","DOIUrl":"10.1007/s11227-021-04013-x","url":null,"abstract":"<p><p><i>Pairs trading</i> is an effective statistical arbitrage strategy considering the spread of paired stocks in a stable cointegration relationship. Nevertheless, rapid market changes may break the relationship (namely structural break), which further leads to tremendous loss in intraday trading. In this paper, we design a two-phase pairs trading strategy optimization framework, namely <i>structural break-aware pairs trading strategy</i> (<i>SAPT</i>), by leveraging machine learning techniques. Phase one is a hybrid model extracting frequency- and time-domain features to detect structural breaks. Phase two optimizes pairs trading strategy by sensing important risks, including structural breaks and market-closing risks, with a novel reinforcement learning model. In addition, the transaction cost is factored in a cost-aware objective to avoid significant reduction of profitability. Through large-scale experiments in real Taiwan stock market datasets, SAPT outperforms the state-of-the-art strategies by at least 456% and 934% in terms of profit and Sortino ratio, respectively.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":"78 3","pages":"3843-3882"},"PeriodicalIF":3.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8369334/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39336202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KS-DDoS: Kafka streams-based classification approach for DDoS attacks. KS-DDoS:基于Kafka流的DDoS攻击分类方法。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-01-01 Epub Date: 2022-01-16 DOI: 10.1007/s11227-021-04241-1
Nilesh Vishwasrao Patil, C Rama Krishna, Krishan Kumar

A distributed denial of service (DDoS) attack is the most destructive threat for internet-based systems and their resources. It stops the execution of victims by transferring large numbers of network traces. Due to this, legitimate users experience a delay while accessing internet-based systems and their resources. Even a short delay in responses leads to a massive financial loss. Numerous techniques have been proposed to protect internet-based systems from various kinds of DDoS attacks. However, the frequency and strength of attacks are increasing year-after-year. This paper proposes a novel Apache Kafka Streams-based distributed classification approach named KS-DDoS. For this classification approach, firstly, we design distributed classification models on the Hadoop cluster using highly scalable machine learning algorithms by fetching data from Hadoop distributed files system (HDFS). Secondly, we deploy an efficient distributed classification model on the Kafka Stream cluster to classify incoming network traces into nine classes in real-time. Further, this distributed classification approach stores highly discriminative features with predicted outcomes into HDFS for creating/updating models using a new set of instances. We implemented a distributed processing framework-based experimental environment to design, deploy, and validate the proposed classification approach for DDoS attacks. The results show that the proposed distributed KS-DDoS classification approach efficiently classifies incoming network traces with at least 80% classification accuracy.

分布式拒绝服务(DDoS)攻击是对基于互联网的系统及其资源最具破坏性的威胁。它通过传输大量网络痕迹来阻止受害者的执行。因此,合法用户在访问基于internet的系统及其资源时会遇到延迟。即使是短暂的反应延迟也会导致巨大的经济损失。已经提出了许多技术来保护基于互联网的系统免受各种DDoS攻击。然而,袭击的频率和强度逐年增加。本文提出了一种新的基于Apache Kafka streams的分布式分类方法——KS-DDoS。对于这种分类方法,首先,我们通过从Hadoop分布式文件系统(HDFS)中获取数据,使用高度可扩展的机器学习算法在Hadoop集群上设计分布式分类模型。其次,我们在Kafka Stream集群上部署了一个高效的分布式分类模型,将传入的网络痕迹实时分为9类。此外,这种分布式分类方法将具有预测结果的高度判别特征存储到HDFS中,以便使用一组新的实例创建/更新模型。我们实现了一个基于分布式处理框架的实验环境来设计、部署和验证所提出的DDoS攻击分类方法。结果表明,本文提出的分布式KS-DDoS分类方法能够有效地对传入网络痕迹进行分类,分类准确率达到80%以上。
{"title":"KS-DDoS: Kafka streams-based classification approach for DDoS attacks.","authors":"Nilesh Vishwasrao Patil,&nbsp;C Rama Krishna,&nbsp;Krishan Kumar","doi":"10.1007/s11227-021-04241-1","DOIUrl":"https://doi.org/10.1007/s11227-021-04241-1","url":null,"abstract":"<p><p>A distributed denial of service (DDoS) attack is the most destructive threat for internet-based systems and their resources. It stops the execution of victims by transferring large numbers of network traces. Due to this, legitimate users experience a delay while accessing internet-based systems and their resources. Even a short delay in responses leads to a massive financial loss. Numerous techniques have been proposed to protect internet-based systems from various kinds of DDoS attacks. However, the frequency and strength of attacks are increasing year-after-year. This paper proposes a novel Apache Kafka Streams-based distributed classification approach named KS-DDoS. For this classification approach, firstly, we design distributed classification models on the Hadoop cluster using highly scalable machine learning algorithms by fetching data from Hadoop distributed files system (HDFS). Secondly, we deploy an efficient distributed classification model on the Kafka Stream cluster to classify incoming network traces into nine classes in real-time. Further, this distributed classification approach stores highly discriminative features with predicted outcomes into HDFS for creating/updating models using a new set of instances. We implemented a distributed processing framework-based experimental environment to design, deploy, and validate the proposed classification approach for DDoS attacks. The results show that the proposed distributed KS-DDoS classification approach efficiently classifies incoming network traces with at least 80% classification accuracy.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":"78 6","pages":"8946-8976"},"PeriodicalIF":3.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8761113/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39941274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A hybrid machine learning approach for detecting unprecedented DDoS attacks. 用于检测前所未有的DDoS攻击的混合机器学习方法。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-01-01 Epub Date: 2022-01-07 DOI: 10.1007/s11227-021-04253-x
Mohammad Najafimehr, Sajjad Zarifzadeh, Seyedakbar Mostafavi

Service availability plays a vital role on computer networks, against which Distributed Denial of Service (DDoS) attacks are an increasingly growing threat each year. Machine learning (ML) is a promising approach widely used for DDoS detection, which obtains satisfactory results for pre-known attacks. However, they are almost incapable of detecting unknown malicious traffic. This paper proposes a novel method combining both supervised and unsupervised algorithms. First, a clustering algorithm separates the anomalous traffic from the normal data using several flow-based features. Then, using certain statistical measures, a classification algorithm is used to label the clusters. Employing a big data processing framework, we evaluate the proposed method by training on the CICIDS2017 dataset and testing on a different set of attacks provided in the more up-to-date CICDDoS2019. The results demonstrate that the Positive Likelihood Ratio (LR+) of our method is approximately 198% higher than the ML classification algorithms.

服务可用性在计算机网络中起着至关重要的作用,针对分布式拒绝服务(DDoS)攻击的威胁每年都在日益增长。机器学习(ML)是一种很有前途的方法,广泛用于DDoS检测,对于已知的攻击可以获得满意的结果。然而,它们几乎无法检测未知的恶意流量。本文提出了一种将监督算法和无监督算法相结合的新方法。首先,聚类算法使用几个基于流的特征将异常流量从正常数据中分离出来。然后,使用一定的统计度量,使用分类算法来标记聚类。采用大数据处理框架,我们通过在CICIDS2017数据集上进行训练,并在最新的CICDDoS2019中提供的一组不同的攻击上进行测试,来评估所提出的方法。结果表明,该方法的正似然比(LR+)比ML分类算法高198%左右。
{"title":"A hybrid machine learning approach for detecting unprecedented DDoS attacks.","authors":"Mohammad Najafimehr,&nbsp;Sajjad Zarifzadeh,&nbsp;Seyedakbar Mostafavi","doi":"10.1007/s11227-021-04253-x","DOIUrl":"https://doi.org/10.1007/s11227-021-04253-x","url":null,"abstract":"<p><p>Service availability plays a vital role on computer networks, against which Distributed Denial of Service (DDoS) attacks are an increasingly growing threat each year. Machine learning (ML) is a promising approach widely used for DDoS detection, which obtains satisfactory results for pre-known attacks. However, they are almost incapable of detecting unknown malicious traffic. This paper proposes a novel method combining both supervised and unsupervised algorithms. First, a clustering algorithm separates the anomalous traffic from the normal data using several flow-based features. Then, using certain statistical measures, a classification algorithm is used to label the clusters. Employing a big data processing framework, we evaluate the proposed method by training on the CICIDS2017 dataset and testing on a different set of attacks provided in the more up-to-date CICDDoS2019. The results demonstrate that the Positive Likelihood Ratio (LR+) of our method is approximately 198% higher than the ML classification algorithms.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":"78 6","pages":"8106-8136"},"PeriodicalIF":3.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8739683/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39688568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Stock exchange trading optimization algorithm: a human-inspired method for global optimization. 证券交易所交易优化算法:一种人类启发的全局优化方法。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-01-01 DOI: 10.1007/s11227-021-03943-w
Hojjat Emami

In this paper, a human-inspired optimization algorithm called stock exchange trading optimization (SETO) for solving numerical and engineering problems is introduced. The inspiration source of this optimizer is the behavior of traders and stock price changes in the stock market. Traders use various fundamental and technical analysis methods to gain maximum profit. SETO mathematically models the technical trading strategy of traders to perform optimization. It contains three main actuators including rising, falling, and exchange. These operators navigate the search agents toward the global optimum. The proposed algorithm is compared with seven popular meta-heuristic optimizers on forty single-objective unconstraint numerical functions and four engineering design problems. The statistical results obtained on test problems show that SETO is capable of providing competitive and promising performances compared with counterpart algorithms in solving optimization problems of different dimensions, especially 1000-dimension problems. Out of 40 numerical functions, the SETO algorithm has achieved the global optimum on 36 functions, and out of 4 engineering problems, it has obtained the best results on 3 problems.

本文介绍了一种用于解决数值和工程问题的人为优化算法——证券交易优化算法(SETO)。该优化器的灵感来源是股票市场中交易者的行为和股票价格的变化。交易者使用各种基本和技术分析方法来获得最大的利润。SETO对交易者的技术交易策略进行数学建模,以实现最优化。它包含三个主要的执行机构,包括上升、下降和交换。这些操作符引导搜索代理向全局最优方向搜索。针对40个单目标无约束数值函数和4个工程设计问题,与7种常用的元启发式优化算法进行了比较。对测试问题的统计结果表明,与同类算法相比,SETO算法在解决不同维数的优化问题,特别是1000维优化问题上具有较强的竞争力和较好的性能。在40个数值函数中,SETO算法在36个函数上实现了全局最优,在4个工程问题中,SETO算法在3个问题上获得了最佳结果。
{"title":"Stock exchange trading optimization algorithm: a human-inspired method for global optimization.","authors":"Hojjat Emami","doi":"10.1007/s11227-021-03943-w","DOIUrl":"https://doi.org/10.1007/s11227-021-03943-w","url":null,"abstract":"<p><p>In this paper, a human-inspired optimization algorithm called stock exchange trading optimization (SETO) for solving numerical and engineering problems is introduced. The inspiration source of this optimizer is the behavior of traders and stock price changes in the stock market. Traders use various fundamental and technical analysis methods to gain maximum profit. SETO mathematically models the technical trading strategy of traders to perform optimization. It contains three main actuators including rising, falling, and exchange. These operators navigate the search agents toward the global optimum. The proposed algorithm is compared with seven popular meta-heuristic optimizers on forty single-objective unconstraint numerical functions and four engineering design problems. The statistical results obtained on test problems show that SETO is capable of providing competitive and promising performances compared with counterpart algorithms in solving optimization problems of different dimensions, especially 1000-dimension problems. Out of 40 numerical functions, the SETO algorithm has achieved the global optimum on 36 functions, and out of 4 engineering problems, it has obtained the best results on 3 problems.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":"78 2","pages":"2125-2174"},"PeriodicalIF":3.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11227-021-03943-w","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10654294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent malware detection based on graph convolutional network. 基于图卷积网络的恶意软件智能检测。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2022-01-01 Epub Date: 2021-08-24 DOI: 10.1007/s11227-021-04020-y
Shanxi Li, Qingguo Zhou, Rui Zhou, Qingquan Lv

Malware has seriously threatened the safety of computer systems for a long time. Due to the rapid development of anti-detection technology, traditional detection methods based on static analysis and dynamic analysis have limited effects. With its better predictive performance, AI-based malware detection has been increasingly used to deal with malware in recent years. However, due to the diversity of malware, it is difficult to extract feature from malware, which make malware detection not conductive to the application of AI technology. To solve the problem, a malware classifier based on graph convolutional network is designed to adapt to the difference of malware characteristics. The specific method is to firstly extract the API call sequence from the malware code and generate a directed cycle graph, then use the Markov chain and principal component analysis method to extract the feature map of the graph, and design a classifier based on graph convolutional network, and finally analyze and compare the performance of the method. The results show that the method has better performance in most detection, and the highest accuracy is 98.32 % , compared with existing methods, our model is superior to other methods in terms of FPR and accuracy. It is also stable to deal with the development and growth of malware.

长期以来,恶意软件严重威胁着计算机系统的安全。由于反检测技术的快速发展,传统的基于静态分析和动态分析的检测方法效果有限。近年来,基于人工智能的恶意软件检测由于具有较好的预测性能,越来越多地用于恶意软件的处理。然而,由于恶意软件的多样性,很难从恶意软件中提取特征,这使得恶意软件检测不利于人工智能技术的应用。为了解决这一问题,设计了一种基于图卷积网络的恶意软件分类器,以适应恶意软件特征的差异。具体方法是首先从恶意软件代码中提取API调用序列并生成有向循环图,然后利用马尔可夫链和主成分分析法提取图的特征映射,并设计基于图卷积网络的分类器,最后对方法的性能进行分析和比较。结果表明,该方法在大多数检测中具有较好的性能,最高准确率为98.32%,与现有方法相比,该模型在FPR和准确率方面均优于其他方法。它在处理恶意软件的发展和增长方面也很稳定。
{"title":"Intelligent malware detection based on graph convolutional network.","authors":"Shanxi Li,&nbsp;Qingguo Zhou,&nbsp;Rui Zhou,&nbsp;Qingquan Lv","doi":"10.1007/s11227-021-04020-y","DOIUrl":"https://doi.org/10.1007/s11227-021-04020-y","url":null,"abstract":"<p><p>Malware has seriously threatened the safety of computer systems for a long time. Due to the rapid development of anti-detection technology, traditional detection methods based on static analysis and dynamic analysis have limited effects. With its better predictive performance, AI-based malware detection has been increasingly used to deal with malware in recent years. However, due to the diversity of malware, it is difficult to extract feature from malware, which make malware detection not conductive to the application of AI technology. To solve the problem, a malware classifier based on graph convolutional network is designed to adapt to the difference of malware characteristics. The specific method is to firstly extract the API call sequence from the malware code and generate a directed cycle graph, then use the Markov chain and principal component analysis method to extract the feature map of the graph, and design a classifier based on graph convolutional network, and finally analyze and compare the performance of the method. The results show that the method has better performance in most detection, and the highest accuracy is <math><mrow><mn>98.32</mn> <mo>%</mo></mrow> </math> , compared with existing methods, our model is superior to other methods in terms of FPR and accuracy. It is also stable to deal with the development and growth of malware.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":"78 3","pages":"4182-4198"},"PeriodicalIF":3.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11227-021-04020-y","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39364630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of Supercomputing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1