首页 > 最新文献

International Journal of Machine Learning and Cybernetics最新文献

英文 中文
Predicting overnights in smart villages: the importance of context information 预测智慧村庄的过夜时间:背景信息的重要性
IF 5.6 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-28 DOI: 10.1007/s13042-024-02337-7
Daniel Bolaños-Martinez, Jose Luis Garrido, Maria Bermudez-Edo

The tourism industry increasingly employs sensors and machine learning for tasks such as demand prediction and mobility forecasting. However, some challenges in data collection remain, especially with information privacy and resource management. We propose a vehicle classification model based on License Plate Recognition (LPR) sensor data, incorporating contextual datasets not explored in the existing literature to predict the number of nights a vehicle will stay in a mountain tourist area. We also study the importance of each dataset in the results. Our analysis utilizes data from four LPR cameras spanning 17 months. We compare different classification models optimized through ensemble techniques. Additionally, an ablation study assesses the impact of each dataset, with variables categorized by expert knowledge into seasonal, socio-economic or visit-related. Optimal dataset selection demonstrates a 22.2% reduction in processing time and an 80% decrease in the number of variables, with only a slight decrease of 0.01 in the Area Under the Curve (AUC) compared to using all available variables. This research provides information to develop tourism prediction models, guiding which datasets and calculated variables are the most important while balancing the processing time and AUC.

旅游业越来越多地利用传感器和机器学习来完成需求预测和流动性预测等任务。然而,数据收集仍面临一些挑战,尤其是信息隐私和资源管理方面。我们提出了一种基于车牌识别(LPR)传感器数据的车辆分类模型,结合现有文献中未涉及的上下文数据集来预测车辆在山区旅游区停留的天数。我们还研究了每个数据集在结果中的重要性。我们的分析利用了四个 LPR 摄像机 17 个月的数据。我们比较了通过集合技术优化的不同分类模型。此外,一项消融研究评估了每个数据集的影响,根据专家知识将变量分为季节性变量、社会经济变量或与访问相关的变量。最佳数据集选择表明,与使用所有可用变量相比,处理时间减少了 22.2%,变量数量减少了 80%,而曲线下面积(AUC)仅略微减少了 0.01。这项研究为开发旅游预测模型提供了信息,在平衡处理时间和 AUC 的同时,为哪些数据集和计算变量最重要提供了指导。
{"title":"Predicting overnights in smart villages: the importance of context information","authors":"Daniel Bolaños-Martinez, Jose Luis Garrido, Maria Bermudez-Edo","doi":"10.1007/s13042-024-02337-7","DOIUrl":"https://doi.org/10.1007/s13042-024-02337-7","url":null,"abstract":"<p>The tourism industry increasingly employs sensors and machine learning for tasks such as demand prediction and mobility forecasting. However, some challenges in data collection remain, especially with information privacy and resource management. We propose a vehicle classification model based on License Plate Recognition (LPR) sensor data, incorporating contextual datasets not explored in the existing literature to predict the number of nights a vehicle will stay in a mountain tourist area. We also study the importance of each dataset in the results. Our analysis utilizes data from four LPR cameras spanning 17 months. We compare different classification models optimized through ensemble techniques. Additionally, an ablation study assesses the impact of each dataset, with variables categorized by expert knowledge into seasonal, socio-economic or visit-related. Optimal dataset selection demonstrates a 22.2% reduction in processing time and an 80% decrease in the number of variables, with only a slight decrease of 0.01 in the Area Under the Curve (AUC) compared to using all available variables. This research provides information to develop tourism prediction models, guiding which datasets and calculated variables are the most important while balancing the processing time and AUC.</p>","PeriodicalId":51327,"journal":{"name":"International Journal of Machine Learning and Cybernetics","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial recurrent neural network coordinated secured transmission towards safeguarding confidentiality in smart Industrial Internet of Things 人工递归神经网络协调安全传输,保障智能工业物联网的机密性
IF 5.6 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-28 DOI: 10.1007/s13042-024-02310-4
Arindam Sarkar, Moirangthem Marjit Singh, Hanjabam Saratchandra Sharma

This research introduces a new method to tackle the issue of exchanging cryptographic keys in the Industrial Internet of Things (IIoT). This study focuses on the inefficiency and lengthy evaluation procedures of conventional cryptographic key exchange algorithms, which are not appropriate for the rapid and constantly changing IIoT device environment. In the solution domain, the proposed approach uses synchronization of neural networks with vector valued and Recurrent Neural Networks (RNNs), merging drive-response mechanisms to enhance speed and efficiency in crucial operations. The research examines the influence of postponements on the generating arbitrary inputs and coordination challenges in RNNs that incorporate drive-response mechanisms for synchronized input vector creation. This article explains an elementary evaluation of coordination in Artificial Neural Networks (ANNs) by utilizing an RNN framework to structure ANNs for sharing session keys. The study provides multiple contributions: (1) employing the polynomial coordination technique to generate coordinated inputs for the ANN synchronization process using RNNs, (2) using Lyapunov formulas and inequality assessment methods to identify required control parameters and time-varying conditions for achieving synchronization in the drive-response systems proposed with polynomial and non-polynomial functions, (3) demonstrating the connection between polynomial and non-polynomial synchronization with numerical illustrations, and (4) designing symmetric layouts of ANNs to create a session keys in the IIoT network. The suggested technique outperforms existing methods in the literature by offering a quicker, more dependable solution for cryptographic key exchange, paving the way for improved and secure industrial applications. This new method not only fixes current inefficiencies but also paves the way for future improvements in secure communication in the IIoT environment.

本研究介绍了一种新方法来解决工业物联网(IIoT)中的加密密钥交换问题。这项研究的重点是传统加密密钥交换算法效率低下、评估程序冗长,不适合快速且不断变化的 IIoT 设备环境。在解决方案领域,所提出的方法利用神经网络与矢量估值和递归神经网络(RNN)的同步,融合驱动-响应机制,以提高关键操作的速度和效率。研究探讨了延迟对生成任意输入的影响,以及在结合了驱动-响应机制的 RNN 中进行同步输入向量创建所面临的协调挑战。本文通过利用 RNN 框架构建用于共享会话密钥的 ANN,解释了对人工神经网络(ANN)中协调性的基本评估。这项研究做出了多方面的贡献:(1) 使用多项式协调技术为使用 RNN 的 ANN 同步过程生成协调输入,(2) 使用 Lyapunov 公式和不等式评估方法确定所需的控制参数和时变条件,以便在使用多项式和非多项式函数提出的驱动响应系统中实现同步、(3) 通过数值图解证明多项式同步与非多项式同步之间的联系,以及 (4) 设计 ANN 的对称布局,以便在 IIoT 网络中创建会话密钥。所建议的技术优于文献中的现有方法,为加密密钥交换提供了更快速、更可靠的解决方案,为改进工业应用并确保其安全性铺平了道路。这种新方法不仅解决了当前的低效问题,还为未来改进 IIoT 环境中的安全通信铺平了道路。
{"title":"Artificial recurrent neural network coordinated secured transmission towards safeguarding confidentiality in smart Industrial Internet of Things","authors":"Arindam Sarkar, Moirangthem Marjit Singh, Hanjabam Saratchandra Sharma","doi":"10.1007/s13042-024-02310-4","DOIUrl":"https://doi.org/10.1007/s13042-024-02310-4","url":null,"abstract":"<p>This research introduces a new method to tackle the issue of exchanging cryptographic keys in the Industrial Internet of Things (IIoT). This study focuses on the inefficiency and lengthy evaluation procedures of conventional cryptographic key exchange algorithms, which are not appropriate for the rapid and constantly changing IIoT device environment. In the solution domain, the proposed approach uses synchronization of neural networks with vector valued and Recurrent Neural Networks (RNNs), merging drive-response mechanisms to enhance speed and efficiency in crucial operations. The research examines the influence of postponements on the generating arbitrary inputs and coordination challenges in RNNs that incorporate drive-response mechanisms for synchronized input vector creation. This article explains an elementary evaluation of coordination in Artificial Neural Networks (ANNs) by utilizing an RNN framework to structure ANNs for sharing session keys. The study provides multiple contributions: (1) employing the polynomial coordination technique to generate coordinated inputs for the ANN synchronization process using RNNs, (2) using Lyapunov formulas and inequality assessment methods to identify required control parameters and time-varying conditions for achieving synchronization in the drive-response systems proposed with polynomial and non-polynomial functions, (3) demonstrating the connection between polynomial and non-polynomial synchronization with numerical illustrations, and (4) designing symmetric layouts of ANNs to create a session keys in the IIoT network. The suggested technique outperforms existing methods in the literature by offering a quicker, more dependable solution for cryptographic key exchange, paving the way for improved and secure industrial applications. This new method not only fixes current inefficiencies but also paves the way for future improvements in secure communication in the IIoT environment.</p>","PeriodicalId":51327,"journal":{"name":"International Journal of Machine Learning and Cybernetics","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A two-stage emergency supplies procurement model based on prospect multi-attribute three-way decision 基于前景多属性三向决策的两阶段应急物资采购模型
IF 5.6 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-28 DOI: 10.1007/s13042-024-02291-4
Fan Jia, Yujie Wang, Yuanyuan Liu

Emergency supply chain management has recently drawn growing attention of managers and researchers with frequent appearance of pandemics, disasters and safety accidents. Previous studies proposed methods for supplier selection and order allocation, while they cannot satisfy the demand for emergency supplies as emergency events bring many uncertainties and risks in supply chain disruption. To guarantee the efficiency in emergency supplies procurement, this work aims at putting forward a two-stage approach for emergency supplier selection and order allocation by use of three-way decision and fuzzy multi-objective optimization. Firstly, by considering the perceived utilities and perceived losses of purchasing process simultaneously, a prospect profit-based three-way decision model is established. Next, the prospect multi-attribute three-way decision model for emergency supplier selection is proposed, constructing the calculation approaches of thresholds, conditional probabilities as well as decision rules. Thirdly, inspired by perceived utilities and perceived losses of supplies purchasing, the utility-based objective function and loss-based objective function are introduced to multi-objective optimization model for order allocation. Finally, a real case of government emergency supplies procurement is discussed to show the applicability and effectiveness of the proposed approach. The final results of the proposed methodology show that it can effectively manage data with uncertainty, determine the qualified suppliers as well as alternative suppliers simultaneously to prevent emergency supply chain disruption, and provide satisfactory solutions for order allocation by introducing different combinations of objective functions according to decision makers’ preference.

近来,随着流行病、灾害和安全事故的频繁出现,应急供应链管理日益受到管理者和研究者的关注。以往的研究提出了供应商选择和订单分配的方法,但由于突发事件给供应链中断带来了许多不确定性和风险,这些方法无法满足应急物资的需求。为保证应急物资采购的效率,本研究旨在利用三向决策和模糊多目标优化提出一种两阶段的应急供应商选择和订单分配方法。首先,通过同时考虑采购过程中的感知效用和感知损失,建立了基于前景利润的三向决策模型。其次,提出了应急供应商选择的前景多属性三向决策模型,构建了阈值、条件概率和决策规则的计算方法。第三,受物资采购的感知效用和感知损失的启发,在订单分配的多目标优化模型中引入了基于效用的目标函数和基于损失的目标函数。最后,讨论了一个政府应急物资采购的真实案例,以说明所提方法的适用性和有效性。所提方法的最终结果表明,它能有效管理具有不确定性的数据,同时确定合格供应商和备选供应商以防止应急供应链中断,并能根据决策者的偏好引入不同的目标函数组合,为订单分配提供令人满意的解决方案。
{"title":"A two-stage emergency supplies procurement model based on prospect multi-attribute three-way decision","authors":"Fan Jia, Yujie Wang, Yuanyuan Liu","doi":"10.1007/s13042-024-02291-4","DOIUrl":"https://doi.org/10.1007/s13042-024-02291-4","url":null,"abstract":"<p>Emergency supply chain management has recently drawn growing attention of managers and researchers with frequent appearance of pandemics, disasters and safety accidents. Previous studies proposed methods for supplier selection and order allocation, while they cannot satisfy the demand for emergency supplies as emergency events bring many uncertainties and risks in supply chain disruption. To guarantee the efficiency in emergency supplies procurement, this work aims at putting forward a two-stage approach for emergency supplier selection and order allocation by use of three-way decision and fuzzy multi-objective optimization. Firstly, by considering the perceived utilities and perceived losses of purchasing process simultaneously, a prospect profit-based three-way decision model is established. Next, the prospect multi-attribute three-way decision model for emergency supplier selection is proposed, constructing the calculation approaches of thresholds, conditional probabilities as well as decision rules. Thirdly, inspired by perceived utilities and perceived losses of supplies purchasing, the utility-based objective function and loss-based objective function are introduced to multi-objective optimization model for order allocation. Finally, a real case of government emergency supplies procurement is discussed to show the applicability and effectiveness of the proposed approach. The final results of the proposed methodology show that it can effectively manage data with uncertainty, determine the qualified suppliers as well as alternative suppliers simultaneously to prevent emergency supply chain disruption, and provide satisfactory solutions for order allocation by introducing different combinations of objective functions according to decision makers’ preference.</p>","PeriodicalId":51327,"journal":{"name":"International Journal of Machine Learning and Cybernetics","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G-SIID: an intelligent hybrid DDoS intrusion detector for 5G IoT networks 5G-SIID:面向 5G 物联网网络的智能混合 DDoS 入侵探测器
IF 5.6 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-27 DOI: 10.1007/s13042-024-02332-y
Sapna Sadhwani, Aakar Mathur, Raja Muthalagu, Pranav M. Pawar

The constrained resources of Internet of Things (IoT) devices make them susceptible to Distributed Denial-of-Service (DDoS) attacks that disrupt service availability by overwhelming systems. Thus, effective intrusion detection is critical to ensuring uninterrupted IoT activities. This research presents a scalable system that combines machine and deep learning models with optimized data processing to secure IoT devices against DDoS attacks. A real-world 5G-IoT network simulation dataset was used to evaluate performance. Robust feature selection identified the 10 most informative features from the high-dimensional data. These features were used to train eight classifiers, namely: k-Nearest Neighbors (KNN), Naive Bayes (NB), Decision Tree (DT), Random Forest (RF), Multi-Layer Perceptron (MLP), Convolutional Neural Network (CNN), Long-Short-Term Memory (LSTM) and hybrid CNN-LSTM models for DDoS attack detection. Experiments demonstrated 99.99% and 99.98% accuracy for multiclass and binary classification using the proposed hybrid CNN-LSTM model. Crucially, time- and space-complexity analysis validates real-world feasibility. Unlike prior works, this system optimally balances accuracy, efficiency, and adaptability through a precisely engineered model architecture, outperforming existing models. In general, this accurate, efficient, and adaptable system addresses critical IoT security challenges, improving cyber resilience in smart cities and autonomous vehicles.

物联网(IoT)设备的资源有限,很容易受到分布式拒绝服务(DDoS)攻击,这些攻击会压垮系统,从而破坏服务的可用性。因此,有效的入侵检测对于确保不间断的物联网活动至关重要。本研究提出了一种可扩展的系统,它将机器学习和深度学习模型与优化的数据处理相结合,以确保物联网设备免受 DDoS 攻击。真实世界的 5G 物联网网络模拟数据集被用来评估性能。稳健的特征选择从高维数据中识别出了 10 个信息量最大的特征。这些特征被用于训练八种分类器,即用于 DDoS 攻击检测的 k-近邻(KNN)、Naive Bayes(NB)、决策树(DT)、随机森林(RF)、多层感知器(MLP)、卷积神经网络(CNN)、长期记忆(LSTM)和混合 CNN-LSTM 模型。实验表明,使用所提出的混合 CNN-LSTM 模型进行多类和二元分类的准确率分别为 99.99% 和 99.98%。最重要的是,时间和空间复杂性分析验证了现实世界的可行性。与之前的研究不同,该系统通过精确设计的模型架构,在准确性、效率和适应性之间实现了最佳平衡,表现优于现有模型。总体而言,这个精确、高效、适应性强的系统能解决关键的物联网安全挑战,提高智能城市和自动驾驶汽车的网络弹性。
{"title":"5G-SIID: an intelligent hybrid DDoS intrusion detector for 5G IoT networks","authors":"Sapna Sadhwani, Aakar Mathur, Raja Muthalagu, Pranav M. Pawar","doi":"10.1007/s13042-024-02332-y","DOIUrl":"https://doi.org/10.1007/s13042-024-02332-y","url":null,"abstract":"<p>The constrained resources of Internet of Things (IoT) devices make them susceptible to Distributed Denial-of-Service (DDoS) attacks that disrupt service availability by overwhelming systems. Thus, effective intrusion detection is critical to ensuring uninterrupted IoT activities. This research presents a scalable system that combines machine and deep learning models with optimized data processing to secure IoT devices against DDoS attacks. A real-world 5G-IoT network simulation dataset was used to evaluate performance. Robust feature selection identified the 10 most informative features from the high-dimensional data. These features were used to train eight classifiers, namely: k-Nearest Neighbors (KNN), Naive Bayes (NB), Decision Tree (DT), Random Forest (RF), Multi-Layer Perceptron (MLP), Convolutional Neural Network (CNN), Long-Short-Term Memory (LSTM) and hybrid CNN-LSTM models for DDoS attack detection. Experiments demonstrated 99.99% and 99.98% accuracy for multiclass and binary classification using the proposed hybrid CNN-LSTM model. Crucially, time- and space-complexity analysis validates real-world feasibility. Unlike prior works, this system optimally balances accuracy, efficiency, and adaptability through a precisely engineered model architecture, outperforming existing models. In general, this accurate, efficient, and adaptable system addresses critical IoT security challenges, improving cyber resilience in smart cities and autonomous vehicles.</p>","PeriodicalId":51327,"journal":{"name":"International Journal of Machine Learning and Cybernetics","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pixel-patch combination loss for refined edge detection 用于精细边缘检测的像素-补丁组合损耗
IF 5.6 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-27 DOI: 10.1007/s13042-024-02338-6
Wenlin Li, Wei Zhang, Yanyan Liu, Changsong Liu, Rudong Jing

As a fundamental image characteristic, edge features encapsulate a wealth of information, serving as a crucial foundation in image segmentation networks for accurately delineating and partitioning object edges. Convolutional neural networks (CNNs) have gained prominence recently, finding extensive utility in edge detection. Previous methods primarily emphasized edge prediction accuracy, ignoring edge refinement. In this work, we introduce a novel encoder-decoder architecture that effectively harnesses hierarchical features. By extending the decoder horizontally, we progressively enhance resolution to preserve intricate details from the original image, thereby producing sharp edges. Additionally, we propose a novel loss function named the Pixel-Patch Combination Loss (P2CL), which employs distinct detection strategies in edge and non-edge regions to bolster network accuracy and yield crisp edges. Furthermore, considering the practicality of the algorithm, our method strikes a fine balance between accuracy and model size. It delivers precise and sharp edges while ensuring efficient model operation, thereby laying a robust foundation for advancements deployed on mobile devices or embedded systems. Our method was evaluated on three publicly available datasets, including BSDS500, Multicue, and BIPED. The experimental results show the superiority of our approach, achieving a competitive ODS F-score of 0.832 on the BSDS500 benchmark and significantly enhancing edge detection accuracy.

作为图像的基本特征,边缘特征包含了丰富的信息,是图像分割网络准确划分对象边缘的重要基础。卷积神经网络(CNN)近来大放异彩,在边缘检测中发挥了广泛的作用。以往的方法主要强调边缘预测的准确性,而忽略了边缘细化。在这项工作中,我们引入了一种新型编码器-解码器架构,可有效利用分层特征。通过水平扩展解码器,我们逐步提高了分辨率,保留了原始图像中错综复杂的细节,从而产生了锐利的边缘。此外,我们还提出了一种名为 "像素-补丁组合损失"(Pixel-Patch Combination Loss,P2CL)的新型损失函数,在边缘和非边缘区域采用不同的检测策略,以提高网络的准确性并生成清晰的边缘。此外,考虑到算法的实用性,我们的方法在准确性和模型大小之间取得了很好的平衡。它既能提供精确锐利的边缘,又能确保模型的高效运行,从而为在移动设备或嵌入式系统上部署先进技术奠定了坚实的基础。我们的方法在三个公开数据集上进行了评估,包括 BSDS500、Multicue 和 BIPED。实验结果表明了我们的方法的优越性,在 BSDS500 基准上取得了 0.832 的有竞争力的 ODS F 分数,并显著提高了边缘检测的准确性。
{"title":"Pixel-patch combination loss for refined edge detection","authors":"Wenlin Li, Wei Zhang, Yanyan Liu, Changsong Liu, Rudong Jing","doi":"10.1007/s13042-024-02338-6","DOIUrl":"https://doi.org/10.1007/s13042-024-02338-6","url":null,"abstract":"<p>As a fundamental image characteristic, edge features encapsulate a wealth of information, serving as a crucial foundation in image segmentation networks for accurately delineating and partitioning object edges. Convolutional neural networks (CNNs) have gained prominence recently, finding extensive utility in edge detection. Previous methods primarily emphasized edge prediction accuracy, ignoring edge refinement. In this work, we introduce a novel encoder-decoder architecture that effectively harnesses hierarchical features. By extending the decoder horizontally, we progressively enhance resolution to preserve intricate details from the original image, thereby producing sharp edges. Additionally, we propose a novel loss function named the Pixel-Patch Combination Loss (<i>P</i><sup><i>2</i></sup><i>CL</i>), which employs distinct detection strategies in edge and non-edge regions to bolster network accuracy and yield crisp edges. Furthermore, considering the practicality of the algorithm, our method strikes a fine balance between accuracy and model size. It delivers precise and sharp edges while ensuring efficient model operation, thereby laying a robust foundation for advancements deployed on mobile devices or embedded systems. Our method was evaluated on three publicly available datasets, including BSDS500, Multicue, and BIPED. The experimental results show the superiority of our approach, achieving a competitive ODS F-score of 0.832 on the BSDS500 benchmark and significantly enhancing edge detection accuracy.</p>","PeriodicalId":51327,"journal":{"name":"International Journal of Machine Learning and Cybernetics","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-indicator based multi-objective evolutionary algorithm with application to neural architecture search 基于多指标的多目标进化算法在神经架构搜索中的应用
IF 5.6 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-27 DOI: 10.1007/s13042-024-02300-6
Oladayo S. Ajani, Daison Darlan, Dzeuban Fenyom Ivan, Rammohan Mallipeddi

({mathbf{I}}_{{mathbf{SDE}}^{+}}) is proven to be one of the leading scalable indicator for evolutionary multi and many-objective optimization. However, it fails to segregate members of a given population beyond the first front as a large number of solutions in the population have identical ({mathbf{I}}_{{mathbf{SDE}}^{+}}) values. This mainly affects the performance of the algorithm when handling optimization problems with lower objectives. Consequently, we hypothesize that the overall performance of the algorithm can be further improved by introducing a categorization mechanism similar to the categorization of Pareto Fronts (PFs) in dominance-based methods. Therefore, in this work, we propose a Multi-Indicator-Based Multi-Objective Evolutionary Algorithm (MI-MOEA) which categorizes all the solutions into different fronts. Specifically, the indicators are based on the popular ({mathbf{I}}_{{mathbf{SDE}}^{+}}) indicator and make use of the minimum and median distance values among the different distances when the solutions with better Sum of Objectives (SOB) are projected. The use of these two ({mathbf{I}}_{{mathbf{SDE}}^{+}})-based indicator values features an efficient balance of exploration and exploitation. To evaluate the performance of the proposed MI-MOEA, Neural Architecture Search (NAS) which involves the design of appropriate architectures suitable for specific applications is employed. From an optimization perspective, NAS involves multiple conflicting objectives that needs to be simultaneously optimized. In this paper, we consider a recently proposed multi-objective NAS benchmark and favorably evaluate the performance of MI-MOEA compared to other state-of-the-art MOEAs.

事实证明,({mathbf{I}}_{mathbf{SDE}}^{+}})是进化多目标优化的主要可扩展指标之一。然而,由于种群中的大量解决方案具有相同的 ({mathbf{I}}_{{mathbf{SDE}}^{+}}/)值,它无法将给定种群中的成员分离到第一前沿之外。这主要影响了算法在处理低目标优化问题时的性能。因此,我们假设,通过引入一种类似于基于优势的方法中帕累托前沿(PFs)分类机制,可以进一步提高算法的整体性能。因此,在这项工作中,我们提出了一种基于多指标的多目标进化算法(MI-MOEA),它将所有解决方案分为不同的前沿。具体来说,这些指标是基于流行的 ({mathbf{I}}_{{mathbf{SDE}}^{+}}) 指标,并利用不同距离中的最小距离值和中位距离值来预测目标总和(SOB)较好的解决方案。使用这两个基于指标值的({mathbf{I}}_{mathbf{SDE}}^{+}}/)可以有效平衡探索和利用。为了评估所提出的 MI-MOEA 的性能,我们采用了神经架构搜索(NAS),其中包括设计适合特定应用的适当架构。从优化的角度来看,NAS 涉及需要同时优化的多个相互冲突的目标。在本文中,我们考虑了最近提出的多目标 NAS 基准,并与其他最先进的 MOEA 相比,对 MI-MOEA 的性能进行了有利的评估。
{"title":"Multi-indicator based multi-objective evolutionary algorithm with application to neural architecture search","authors":"Oladayo S. Ajani, Daison Darlan, Dzeuban Fenyom Ivan, Rammohan Mallipeddi","doi":"10.1007/s13042-024-02300-6","DOIUrl":"https://doi.org/10.1007/s13042-024-02300-6","url":null,"abstract":"<p><span>({mathbf{I}}_{{mathbf{SDE}}^{+}})</span> is proven to be one of the leading scalable indicator for evolutionary multi and many-objective optimization. However, it fails to segregate members of a given population beyond the first front as a large number of solutions in the population have identical <span>({mathbf{I}}_{{mathbf{SDE}}^{+}})</span> values. This mainly affects the performance of the algorithm when handling optimization problems with lower objectives. Consequently, we hypothesize that the overall performance of the algorithm can be further improved by introducing a categorization mechanism similar to the categorization of Pareto Fronts (PFs) in dominance-based methods. Therefore, in this work, we propose a Multi-Indicator-Based Multi-Objective Evolutionary Algorithm (MI-MOEA) which categorizes all the solutions into different fronts. Specifically, the indicators are based on the popular <span>({mathbf{I}}_{{mathbf{SDE}}^{+}})</span> indicator and make use of the minimum and median distance values among the different distances when the solutions with better Sum of Objectives (SOB) are projected. The use of these two <span>({mathbf{I}}_{{mathbf{SDE}}^{+}})</span>-based indicator values features an efficient balance of exploration and exploitation. To evaluate the performance of the proposed MI-MOEA, Neural Architecture Search (NAS) which involves the design of appropriate architectures suitable for specific applications is employed. From an optimization perspective, NAS involves multiple conflicting objectives that needs to be simultaneously optimized. In this paper, we consider a recently proposed multi-objective NAS benchmark and favorably evaluate the performance of MI-MOEA compared to other state-of-the-art MOEAs.</p>","PeriodicalId":51327,"journal":{"name":"International Journal of Machine Learning and Cybernetics","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stochastic configuration network modeling method based on information superposition and mixture correntropy 基于信息叠加和混合熵的随机配置网络建模方法
IF 5.6 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-27 DOI: 10.1007/s13042-024-02320-2
Aijun Yan, Kaicheng Hu, Dianhui Wang

To improve the generalizability and robustness of stochastic configuration networks (SCNs), this paper proposes a robust modeling method based on information superposition and mixture correntropy. First, the mapping information of the (sigmoid) activation function and its derivative function is superimposed, and the hidden layer parameters are randomly assigned through a supervisory mechanism to improve the diversity of the hidden layer mapping. Second, mixture correntropy is used to construct a robust loss function, and different Gaussian kernels are used to measure the contribution of training samples to suppress the negative impact of data noise on the accuracy of the model. Finally, the performance of the proposed modeling method is tested on functional approximation, four benchmark datasets, and historical data from the municipal solid waste incineration process. The experimental results show that the modeling method proposed in this paper has advantages in terms of generalizability and robustness.

为了提高随机配置网络(SCN)的泛化能力和鲁棒性,本文提出了一种基于信息叠加和混合熵的鲁棒建模方法。首先,叠加(sigmoid)激活函数及其导函数的映射信息,并通过监督机制随机分配隐层参数,以提高隐层映射的多样性。其次,利用混合熵构建鲁棒损失函数,并使用不同的高斯核来衡量训练样本的贡献,以抑制数据噪声对模型准确性的负面影响。最后,在函数近似、四个基准数据集和城市固体废物焚烧过程的历史数据上测试了所提建模方法的性能。实验结果表明,本文提出的建模方法在普适性和鲁棒性方面具有优势。
{"title":"Stochastic configuration network modeling method based on information superposition and mixture correntropy","authors":"Aijun Yan, Kaicheng Hu, Dianhui Wang","doi":"10.1007/s13042-024-02320-2","DOIUrl":"https://doi.org/10.1007/s13042-024-02320-2","url":null,"abstract":"<p>To improve the generalizability and robustness of stochastic configuration networks (SCNs), this paper proposes a robust modeling method based on information superposition and mixture correntropy. First, the mapping information of the (sigmoid) activation function and its derivative function is superimposed, and the hidden layer parameters are randomly assigned through a supervisory mechanism to improve the diversity of the hidden layer mapping. Second, mixture correntropy is used to construct a robust loss function, and different Gaussian kernels are used to measure the contribution of training samples to suppress the negative impact of data noise on the accuracy of the model. Finally, the performance of the proposed modeling method is tested on functional approximation, four benchmark datasets, and historical data from the municipal solid waste incineration process. The experimental results show that the modeling method proposed in this paper has advantages in terms of generalizability and robustness.</p>","PeriodicalId":51327,"journal":{"name":"International Journal of Machine Learning and Cybernetics","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning cluster-wise label distribution for label enhancement 学习聚类标签分布,实现标签增强
IF 5.6 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-27 DOI: 10.1007/s13042-024-02343-9
Jun Fan, Heng-Ru Zhang, Fan Min

Label enhancement (LE) refers to the process of recovering label distributions from logical labels for less ambiguity. Current LE techniques concentrate on learning each instance individually, which ignores the instance correlation. In this paper, we propose to learn a cluster-wise label distribution (CWLD) shared by all instances of the cluster to explore the instance correlation. The softmax-normalized sum of the CWLD and the logical label vector yields the label distribution. CWLD is learned in an iterative manner. Following instance clustering, the label distributions of all instances in each cluster are averaged. The asymmetric label correlation is then mined using heat conduction. This process is repeated until the label distribution has reached a point of convergence. Experiments were undertaken on thirteen real-world datasets compared with six state-of-the-art algorithms. Results demonstrate the effectiveness and superiority of our proposed method.

标签增强(LE)是指从逻辑标签中恢复标签分布以减少模糊性的过程。目前的标签增强技术集中于单独学习每个实例,这就忽略了实例之间的相关性。在本文中,我们建议学习集群中所有实例共享的集群标签分布(CWLD),以探索实例相关性。CWLD 与逻辑标签向量的软最大归一化之和即为标签分布。CWLD 以迭代方式学习。实例聚类后,对每个聚类中所有实例的标签分布进行平均。然后利用热传导挖掘非对称标签相关性。这一过程不断重复,直到标签分布达到收敛点。在 13 个实际数据集上进行了实验,并与 6 种最先进的算法进行了比较。结果证明了我们提出的方法的有效性和优越性。
{"title":"Learning cluster-wise label distribution for label enhancement","authors":"Jun Fan, Heng-Ru Zhang, Fan Min","doi":"10.1007/s13042-024-02343-9","DOIUrl":"https://doi.org/10.1007/s13042-024-02343-9","url":null,"abstract":"<p>Label enhancement (LE) refers to the process of recovering label distributions from logical labels for less ambiguity. Current LE techniques concentrate on learning each instance individually, which ignores the instance correlation. In this paper, we propose to learn a cluster-wise label distribution (CWLD) shared by all instances of the cluster to explore the instance correlation. The softmax-normalized sum of the CWLD and the logical label vector yields the label distribution. CWLD is learned in an iterative manner. Following instance clustering, the label distributions of all instances in each cluster are averaged. The asymmetric label correlation is then mined using heat conduction. This process is repeated until the label distribution has reached a point of convergence. Experiments were undertaken on thirteen real-world datasets compared with six state-of-the-art algorithms. Results demonstrate the effectiveness and superiority of our proposed method.</p>","PeriodicalId":51327,"journal":{"name":"International Journal of Machine Learning and Cybernetics","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An adaptive consensus model for managing non-cooperative behaviors in portfolio optimization for large companies 管理大公司投资组合优化中的非合作行为的自适应共识模型
IF 5.6 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-26 DOI: 10.1007/s13042-024-02331-z
Danping Li, Shicheng Hu

The mean–variance (MV) model provides numerous optimal portfolios for managing a firm's asset portfolio. Portfolio decisions in large corporations involve many interest groups, such as shareholders, bondholders, and employees, and require the assistance of large experts. However, experts from different departments with different cognitive levels and interests can differ or even conflict in their assessments of portfolios. To guarantee their interests, some experts may exhibit non-cooperative behavior, thus reducing the efficiency of reaching a consensus. To tackle this issue, the research aims to develop a large-scale group interactive portfolio optimization method that incorporates non-cooperative behaviors and leverages social network analysis (SN-LSGDM-NC-PO). First, various consensus feedback strategies based on minimum adjustment are formulated to provide advice during the negotiation process according to the global and local levels. Then, considering the acceptance of advice and the effect of expert adjustment on consensus, a new measure of non-cooperative behavior is designed. Non-cooperative behavior by experts can affect trust relations in a social network. Therefore, trust reward and penalty mechanisms, preference penalty mechanisms, and an exit mechanism are developed to manage different types of non-cooperative behavior. Experimental and comparison results demonstrate that the proposed SN-LSGDM-NC-PO algorithm can effectively manage the non-cooperative behaviors and reduce interaction consensus costs.

均值-方差(MV)模型为管理公司的资产组合提供了众多最优投资组合。大型企业的资产组合决策涉及股东、债券持有人和员工等多个利益群体,需要大量专家的协助。然而,来自不同部门、认知水平和利益诉求不同的专家在评估投资组合时可能会产生分歧甚至冲突。为了保证自身利益,一些专家可能会表现出不合作行为,从而降低达成共识的效率。针对这一问题,本研究旨在开发一种包含非合作行为并利用社会网络分析的大规模群体交互式投资组合优化方法(SN-LSGDM-NC-PO)。首先,根据全局和局部水平,制定了各种基于最小调整的共识反馈策略,以便在协商过程中提供建议。然后,考虑到建议的接受程度和专家调整对共识的影响,设计了一种新的非合作行为测量方法。专家的非合作行为会影响社会网络中的信任关系。因此,开发了信任奖惩机制、偏好惩罚机制和退出机制来管理不同类型的非合作行为。实验和比较结果表明,所提出的 SN-LSGDM-NC-PO 算法能有效管理非合作行为,降低交互共识成本。
{"title":"An adaptive consensus model for managing non-cooperative behaviors in portfolio optimization for large companies","authors":"Danping Li, Shicheng Hu","doi":"10.1007/s13042-024-02331-z","DOIUrl":"https://doi.org/10.1007/s13042-024-02331-z","url":null,"abstract":"<p>The mean–variance (MV) model provides numerous optimal portfolios for managing a firm's asset portfolio. Portfolio decisions in large corporations involve many interest groups, such as shareholders, bondholders, and employees, and require the assistance of large experts. However, experts from different departments with different cognitive levels and interests can differ or even conflict in their assessments of portfolios. To guarantee their interests, some experts may exhibit non-cooperative behavior, thus reducing the efficiency of reaching a consensus. To tackle this issue, the research aims to develop a large-scale group interactive portfolio optimization method that incorporates non-cooperative behaviors and leverages social network analysis (SN-LSGDM-NC-PO). First, various consensus feedback strategies based on minimum adjustment are formulated to provide advice during the negotiation process according to the global and local levels. Then, considering the acceptance of advice and the effect of expert adjustment on consensus, a new measure of non-cooperative behavior is designed. Non-cooperative behavior by experts can affect trust relations in a social network. Therefore, trust reward and penalty mechanisms, preference penalty mechanisms, and an exit mechanism are developed to manage different types of non-cooperative behavior. Experimental and comparison results demonstrate that the proposed SN-LSGDM-NC-PO algorithm can effectively manage the non-cooperative behaviors and reduce interaction consensus costs.</p>","PeriodicalId":51327,"journal":{"name":"International Journal of Machine Learning and Cybernetics","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond traditional visual object tracking: a survey 超越传统的视觉物体追踪:一项调查
IF 5.6 3区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-08-26 DOI: 10.1007/s13042-024-02345-7
Omar Abdelaziz, Mohamed Shehata, Mohamed Mohamed

Single object tracking is a vital task of many applications in critical fields. However, it is still considered one of the most challenging vision tasks. In recent years, computer vision, especially object tracking, witnessed the introduction or adoption of many novel techniques, setting new fronts for performance. In this survey, we visit some of the cutting-edge techniques in vision, such as Sequence Models, Generative Models, Self-supervised Learning, Unsupervised Learning, Reinforcement Learning, Meta-Learning, Continual Learning, and Domain Adaptation, focusing on their application in single object tracking. We propose a novel categorization of single object tracking methods based on novel techniques and trends. Also, we conduct a comparative analysis of the performance reported by the methods presented on popular tracking benchmarks. Moreover, we analyze the pros and cons of the presented approaches and present a guide for non-traditional techniques in single object tracking. Finally, we suggest potential avenues for future research in single-object tracking.

单个物体跟踪是许多关键领域应用中的一项重要任务。然而,它仍然被认为是最具挑战性的视觉任务之一。近年来,计算机视觉,尤其是物体跟踪,引入或采用了许多新技术,为性能开辟了新领域。在本调查中,我们将访问视觉领域的一些前沿技术,如序列模型、生成模型、自监督学习、无监督学习、强化学习、元学习、持续学习和域适应,重点关注它们在单个物体跟踪中的应用。我们根据新技术和新趋势,对单目标跟踪方法进行了新的分类。此外,我们还对所介绍的方法在流行跟踪基准上的性能报告进行了比较分析。此外,我们还分析了所介绍方法的优缺点,并为单个物体跟踪中的非传统技术提供了指导。最后,我们提出了未来单目标跟踪研究的潜在途径。
{"title":"Beyond traditional visual object tracking: a survey","authors":"Omar Abdelaziz, Mohamed Shehata, Mohamed Mohamed","doi":"10.1007/s13042-024-02345-7","DOIUrl":"https://doi.org/10.1007/s13042-024-02345-7","url":null,"abstract":"<p>Single object tracking is a vital task of many applications in critical fields. However, it is still considered one of the most challenging vision tasks. In recent years, computer vision, especially object tracking, witnessed the introduction or adoption of many novel techniques, setting new fronts for performance. In this survey, we visit some of the cutting-edge techniques in vision, such as Sequence Models, Generative Models, Self-supervised Learning, Unsupervised Learning, Reinforcement Learning, Meta-Learning, Continual Learning, and Domain Adaptation, focusing on their application in single object tracking. We propose a novel categorization of single object tracking methods based on novel techniques and trends. Also, we conduct a comparative analysis of the performance reported by the methods presented on popular tracking benchmarks. Moreover, we analyze the pros and cons of the presented approaches and present a guide for non-traditional techniques in single object tracking. Finally, we suggest potential avenues for future research in single-object tracking.</p>","PeriodicalId":51327,"journal":{"name":"International Journal of Machine Learning and Cybernetics","volume":null,"pages":null},"PeriodicalIF":5.6,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142209177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Machine Learning and Cybernetics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1