首页 > 最新文献

Big Data Mining and Analytics最新文献

英文 中文
Human Action Recognition Using Difference of Gaussian and Difference of Wavelet 基于高斯差分和小波差分的人体动作识别
IF 13.6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-04-07 DOI: 10.26599/BDMA.2022.9020040
Gopampallikar Vinoda Reddy;Kongara Deepika;Lakshmanan Malliga;Duraivelu Hemanand;Chinnadurai Senthilkumar;Subburayalu Gopalakrishnan;Yousef Farhaoui
Human Action Recognition (HAR) attempts to recognize the human action from images and videos. The major challenge in HAR is the design of an action descriptor that makes the HAR system robust for different environments. A novel action descriptor is proposed in this study, based on two independent spatial and spectral filters. The proposed descriptor uses a Difference of Gaussian (DoG) filter to extract scale-invariant features and a Difference of Wavelet (DoW) filter to extract spectral information. To create a composite feature vector for a particular test action picture, the Discriminant of Guassian (DoG) and Difference of Wavelet (DoW) features are combined. Linear Discriminant Analysis (LDA), a widely used dimensionality reduction technique, is also used to eliminate duplicate data. Finally, a closest neighbor method is used to classify the dataset. Weizmann and UCF 11 datasets were used to run extensive simulations of the suggested strategy, and the accuracy assessed after the simulations were run on Weizmann datasets for five-fold cross validation is shown to perform well. The average accuracy of DoG + DoW is observed as 83.6635% while the average accuracy of Discrinanat of Guassian (DoG) and Difference of Wavelet (DoW) is observed as 80.2312% and 77.4215%, respectively. The average accuracy measured after the simulation of proposed methods over UCF 11 action dataset for five-fold cross validation DoG + DoW is observed as 62.5231% while the average accuracy of Difference of Guassian (DoG) and Difference of Wavelet (DoW) is observed as 60.3214% and 58.1247%, respectively. From the above accuracy observations, the accuracy of Weizmann is high compared to the accuracy of UCF 11, hence verifying the effectiveness in the improvisation of recognition accuracy.
人类动作识别(HAR)试图从图像和视频中识别人类动作。HAR中的主要挑战是设计一个动作描述符,使HAR系统对不同的环境具有鲁棒性。基于两个独立的空间滤波器和频谱滤波器,本文提出了一种新的动作描述符。该描述符使用高斯差分(DoG)滤波器提取尺度不变特征,使用小波差分(DoW)滤波器提取光谱信息。为了为特定的测试动作画面创建复合特征向量,将高斯判别(DoG)和小波差分(DoW)特征相结合。线性判别分析(LDA)是一种广泛使用的降维技术,也用于消除重复数据。最后,使用最近邻方法对数据集进行分类。Weizmann和UCF11数据集用于对所建议的策略进行广泛的模拟,在Weizmann数据集上进行五次交叉验证后评估的准确性表现良好。DoG+DoW的平均精度为83.6635%,而Guassian的Discrinanat(DoG)和Wavelet的Difference(DoW)的平均精度分别为80.2312%和77.4215%。在五次交叉验证DoG+DoW的UCF11动作数据集上模拟所提出的方法后测得的平均准确度为62.5231%,而高斯差(DoG)和小波差(DoW)的平均准确率分别为60.3214%和58.1247%。根据上述精度观察,与UCF11的精度相比,Weizmann的精度较高,因此验证了识别精度即兴发挥的有效性。
{"title":"Human Action Recognition Using Difference of Gaussian and Difference of Wavelet","authors":"Gopampallikar Vinoda Reddy;Kongara Deepika;Lakshmanan Malliga;Duraivelu Hemanand;Chinnadurai Senthilkumar;Subburayalu Gopalakrishnan;Yousef Farhaoui","doi":"10.26599/BDMA.2022.9020040","DOIUrl":"https://doi.org/10.26599/BDMA.2022.9020040","url":null,"abstract":"Human Action Recognition (HAR) attempts to recognize the human action from images and videos. The major challenge in HAR is the design of an action descriptor that makes the HAR system robust for different environments. A novel action descriptor is proposed in this study, based on two independent spatial and spectral filters. The proposed descriptor uses a Difference of Gaussian (DoG) filter to extract scale-invariant features and a Difference of Wavelet (DoW) filter to extract spectral information. To create a composite feature vector for a particular test action picture, the Discriminant of Guassian (DoG) and Difference of Wavelet (DoW) features are combined. Linear Discriminant Analysis (LDA), a widely used dimensionality reduction technique, is also used to eliminate duplicate data. Finally, a closest neighbor method is used to classify the dataset. Weizmann and UCF 11 datasets were used to run extensive simulations of the suggested strategy, and the accuracy assessed after the simulations were run on Weizmann datasets for five-fold cross validation is shown to perform well. The average accuracy of DoG + DoW is observed as 83.6635% while the average accuracy of Discrinanat of Guassian (DoG) and Difference of Wavelet (DoW) is observed as 80.2312% and 77.4215%, respectively. The average accuracy measured after the simulation of proposed methods over UCF 11 action dataset for five-fold cross validation DoG + DoW is observed as 62.5231% while the average accuracy of Difference of Guassian (DoG) and Difference of Wavelet (DoW) is observed as 60.3214% and 58.1247%, respectively. From the above accuracy observations, the accuracy of Weizmann is high compared to the accuracy of UCF 11, hence verifying the effectiveness in the improvisation of recognition accuracy.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":"6 3","pages":"336-346"},"PeriodicalIF":13.6,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8254253/10097649/10097655.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67838276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Machine Learning Based Framework for a Stage-Wise Classification of Date Palm White Scale Disease 基于机器学习的椰枣白鳞病阶段分类框架
IF 13.6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-04-07 DOI: 10.26599/BDMA.2022.9020022
Abdelaaziz Hessane;Ahmed El Youssefi;Yousef Farhaoui;Badraddine Aghoutane;Fatima Amounas
Date palm production is critical to oasis agriculture, owing to its economic importance and nutritional advantages. Numerous diseases endanger this precious tree, putting a strain on the economy and environment. White scale Parlatoria blanchardi is a damaging bug that degrades the quality of dates. When an infestation reaches a specific degree, it might result in the tree's death. To counter this threat, precise detection of infected leaves and its infestation degree is important to decide if chemical treatment is necessary. This decision is crucial for farmers who wish to minimize yield losses while preserving production quality. For this purpose, we propose a feature extraction and machine learning (ML) technique based framework for classifying the stages of infestation by white scale disease (WSD) in date palm trees by investigating their leaflets images. 80 gray level co-occurrence matrix (GLCM) texture features and 9 hue, saturation, and value (HSV) color moments features are extracted from both grayscale and color images of the used dataset. To classify the WSD into its four classes (healthy, low infestation degree, medium infestation degree, and high infestation degree), two types of ML algorithms were tested; classical machine learning methods, namely, support vector machine (SVM) and k-nearest neighbors (KNN), and ensemble learning methods such as random forest (RF) and light gradient boosting machine (LightGBM). The ML models were trained and evaluated using two datasets: the first is composed of the extracted GLCM features only, and the second combines GLCM and HSV descriptors. The results indicate that SVM classifier outperformed on combined GLCM and HSV features with an accuracy of 98.29%. The proposed framework could be beneficial to the oasis agricultural community in terms of early detection of date palm white scale disease (DPWSD) and assisting in the adoption of preventive measures to protect both date palm trees and crop yield.
椰枣生产具有重要的经济意义和营养优势,对绿洲农业至关重要。许多疾病危及这棵珍贵的树,给经济和环境带来压力。白鳞白僵菌是一种破坏性害虫,会降低椰枣的质量。当虫害达到特定程度时,可能会导致树木死亡。为了应对这种威胁,准确检测受感染的树叶及其侵扰程度对于决定是否需要化学处理至关重要。这一决定对于那些希望在保持生产质量的同时最大限度地减少产量损失的农民来说至关重要。为此,我们提出了一种基于特征提取和机器学习(ML)技术的框架,通过研究椰枣树的小叶图像,对椰枣树白皮病(WSD)侵扰的阶段进行分类。从所使用的数据集的灰度和彩色图像中提取80个灰度共生矩阵(GLCM)纹理特征和9个色调、饱和度和值(HSV)颜色矩特征。为了将WSD分为四类(健康、低侵扰程度、中等侵扰程度和高侵扰程度),测试了两种类型的ML算法;经典的机器学习方法,即支持向量机(SVM)和k近邻(KNN),以及集成学习方法,如随机森林(RF)和光梯度增强机(LightGBM)。ML模型使用两个数据集进行训练和评估:第一个数据集仅由提取的GLCM特征组成,第二个数据集结合了GLCM和HSV描述符。结果表明,SVM分类器在GLCM和HSV组合特征上的准确率高达98.29%。该框架有利于绿洲农业社区早期检测椰枣白皮病(DPWSD),并有助于采取预防措施,保护椰枣树和作物产量。
{"title":"A Machine Learning Based Framework for a Stage-Wise Classification of Date Palm White Scale Disease","authors":"Abdelaaziz Hessane;Ahmed El Youssefi;Yousef Farhaoui;Badraddine Aghoutane;Fatima Amounas","doi":"10.26599/BDMA.2022.9020022","DOIUrl":"https://doi.org/10.26599/BDMA.2022.9020022","url":null,"abstract":"Date palm production is critical to oasis agriculture, owing to its economic importance and nutritional advantages. Numerous diseases endanger this precious tree, putting a strain on the economy and environment. White scale Parlatoria blanchardi is a damaging bug that degrades the quality of dates. When an infestation reaches a specific degree, it might result in the tree's death. To counter this threat, precise detection of infected leaves and its infestation degree is important to decide if chemical treatment is necessary. This decision is crucial for farmers who wish to minimize yield losses while preserving production quality. For this purpose, we propose a feature extraction and machine learning (ML) technique based framework for classifying the stages of infestation by white scale disease (WSD) in date palm trees by investigating their leaflets images. 80 gray level co-occurrence matrix (GLCM) texture features and 9 hue, saturation, and value (HSV) color moments features are extracted from both grayscale and color images of the used dataset. To classify the WSD into its four classes (healthy, low infestation degree, medium infestation degree, and high infestation degree), two types of ML algorithms were tested; classical machine learning methods, namely, support vector machine (SVM) and k-nearest neighbors (KNN), and ensemble learning methods such as random forest (RF) and light gradient boosting machine (LightGBM). The ML models were trained and evaluated using two datasets: the first is composed of the extracted GLCM features only, and the second combines GLCM and HSV descriptors. The results indicate that SVM classifier outperformed on combined GLCM and HSV features with an accuracy of 98.29%. The proposed framework could be beneficial to the oasis agricultural community in terms of early detection of date palm white scale disease (DPWSD) and assisting in the adoption of preventive measures to protect both date palm trees and crop yield.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":"6 3","pages":"263-272"},"PeriodicalIF":13.6,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8254253/10097649/10097658.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67837482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security 基于集成学习的工业物联网安全入侵检测模型
IF 13.6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-04-07 DOI: 10.26599/BDMA.2022.9020032
Mouaad Mohy-Eddine;Azidine Guezzaz;Said Benkirane;Mourade Azrour;Yousef Farhaoui
Industrial Internet of Things (IIoT) represents the expansion of the Internet of Things (IoT) in industrial sectors. It is designed to implicate embedded technologies in manufacturing fields to enhance their operations. However, IIoT involves some security vulnerabilities that are more damaging than those of IoT. Accordingly, Intrusion Detection Systems (IDSs) have been developed to forestall inevitable harmful intrusions. IDSs survey the environment to identify intrusions in real time. This study designs an intrusion detection model exploiting feature engineering and machine learning for IIoT security. We combine Isolation Forest (IF) with Pearson's Correlation Coefficient (PCC) to reduce computational cost and prediction time. IF is exploited to detect and remove outliers from datasets. We apply PCC to choose the most appropriate features. PCC and IF are applied exchangeably (PCCIF and IFPCC). The Random Forest (RF) classifier is implemented to enhance IDS performances. For evaluation, we use the Bot-IoT and NF-UNSW-NB15-v2 datasets. RF-PCCIF and RF-IFPCC show noteworthy results with 99.98% and 99.99% Accuracy (ACC) and 6.18s and 6.25s prediction time on Bot-IoT, respectively. The two models also score 99.30% and 99.18% ACC and 6.71 s and 6.87s prediction time on NF-UNSW-NB15-v2, respectively. Results prove that our designed model has several advantages and higher performance than related models.
工业物联网(IIoT)代表了物联网(IoT)在工业部门的扩展。它旨在将嵌入式技术融入制造领域,以增强其运营能力。然而,IIoT涉及一些比物联网更具破坏性的安全漏洞。因此,入侵检测系统(IDS)已经被开发来预防不可避免的有害入侵。IDS调查环境以实时识别入侵。本研究设计了一个利用特征工程和机器学习实现IIoT安全的入侵检测模型。我们将孤立森林(IF)与皮尔逊相关系数(PCC)相结合,以减少计算成本和预测时间。IF被用来检测和去除数据集中的异常值。我们应用PCC来选择最合适的功能。PCC和IF是可交换应用的(PCCIF和IFPCC)。实现了随机森林(RF)分类器来提高IDS的性能。为了进行评估,我们使用了Bot-IoT和NF-UNSW-NB15-v2数据集。RF-PCIF和RF-IFPCC在Bot-IoT上分别以99.98%和99.99%的准确率(ACC)和6.18s和6.25s的预测时间显示了值得注意的结果。这两个模型在NF-UNSW-NB15-v2上的ACC得分分别为99.30%和99.18%,预测时间分别为6.71秒和6.87s。结果证明,我们设计的模型具有几个优点,并且比相关模型具有更高的性能。
{"title":"An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security","authors":"Mouaad Mohy-Eddine;Azidine Guezzaz;Said Benkirane;Mourade Azrour;Yousef Farhaoui","doi":"10.26599/BDMA.2022.9020032","DOIUrl":"https://doi.org/10.26599/BDMA.2022.9020032","url":null,"abstract":"Industrial Internet of Things (IIoT) represents the expansion of the Internet of Things (IoT) in industrial sectors. It is designed to implicate embedded technologies in manufacturing fields to enhance their operations. However, IIoT involves some security vulnerabilities that are more damaging than those of IoT. Accordingly, Intrusion Detection Systems (IDSs) have been developed to forestall inevitable harmful intrusions. IDSs survey the environment to identify intrusions in real time. This study designs an intrusion detection model exploiting feature engineering and machine learning for IIoT security. We combine Isolation Forest (IF) with Pearson's Correlation Coefficient (PCC) to reduce computational cost and prediction time. IF is exploited to detect and remove outliers from datasets. We apply PCC to choose the most appropriate features. PCC and IF are applied exchangeably (PCCIF and IFPCC). The Random Forest (RF) classifier is implemented to enhance IDS performances. For evaluation, we use the Bot-IoT and NF-UNSW-NB15-v2 datasets. RF-PCCIF and RF-IFPCC show noteworthy results with 99.98% and 99.99% Accuracy (ACC) and 6.18s and 6.25s prediction time on Bot-IoT, respectively. The two models also score 99.30% and 99.18% ACC and 6.71 s and 6.87s prediction time on NF-UNSW-NB15-v2, respectively. Results prove that our designed model has several advantages and higher performance than related models.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":"6 3","pages":"273-287"},"PeriodicalIF":13.6,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8254253/10097649/10097653.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67999317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques 基于机器学习技术的云入侵检测方法
IF 13.6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-04-07 DOI: 10.26599/BDMA.2022.9020038
Hanaa Attou;Azidine Guezzaz;Said Benkirane;Mourade Azrour;Yousef Farhaoui
Cloud computing (CC) is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services. In addition, it aims to strengthen systems and make them useful. Regardless of these advantages, cloud providers suffer from many security limits. Particularly, the security of resources and services represents a real challenge for cloud technologies. For this reason, a set of solutions have been implemented to improve cloud security by monitoring resources, services, and networks, then detect attacks. Actually, intrusion detection system (IDS) is an enhanced mechanism used to control traffic within networks and detect abnormal activities. This paper presents a cloud-based intrusion detection model based on random forest (RF) and feature engineering. Specifically, the RF classifier is obtained and integrated to enhance accuracy (ACC) of the proposed detection model. The proposed model approach has been evaluated and validated on two datasets and gives 98.3% ACC and 99.99% ACC using Bot-IoT and NSL-KDD datasets, respectively. Consequently, the obtained results present good performances in terms of ACC, precision, and recall when compared to the recent related works.
云计算(CC)是一种新技术,它使访问网络和计算机资源(如存储和数据管理服务)变得更容易。此外,它旨在加强系统并使其发挥作用。不管这些优势如何,云提供商都受到许多安全限制。特别是,资源和服务的安全性对云技术来说是一个真正的挑战。出于这个原因,已经实施了一套解决方案,通过监控资源、服务和网络,然后检测攻击,来提高云安全性。实际上,入侵检测系统(IDS)是一种用于控制网络内流量和检测异常活动的增强机制。本文提出了一种基于随机森林和特征工程的基于云的入侵检测模型。具体地,获得并集成RF分类器以提高所提出的检测模型的准确性(ACC)。所提出的模型方法已经在两个数据集上进行了评估和验证,使用Bot-IoT和NSL-KDD数据集分别给出了98.3%和99.99%的ACC。因此,与最近的相关工作相比,所获得的结果在ACC、精度和回忆方面表现出良好的性能。
{"title":"Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques","authors":"Hanaa Attou;Azidine Guezzaz;Said Benkirane;Mourade Azrour;Yousef Farhaoui","doi":"10.26599/BDMA.2022.9020038","DOIUrl":"https://doi.org/10.26599/BDMA.2022.9020038","url":null,"abstract":"Cloud computing (CC) is a novel technology that has made it easier to access network and computer resources on demand such as storage and data management services. In addition, it aims to strengthen systems and make them useful. Regardless of these advantages, cloud providers suffer from many security limits. Particularly, the security of resources and services represents a real challenge for cloud technologies. For this reason, a set of solutions have been implemented to improve cloud security by monitoring resources, services, and networks, then detect attacks. Actually, intrusion detection system (IDS) is an enhanced mechanism used to control traffic within networks and detect abnormal activities. This paper presents a cloud-based intrusion detection model based on random forest (RF) and feature engineering. Specifically, the RF classifier is obtained and integrated to enhance accuracy (ACC) of the proposed detection model. The proposed model approach has been evaluated and validated on two datasets and gives 98.3% ACC and 99.99% ACC using Bot-IoT and NSL-KDD datasets, respectively. Consequently, the obtained results present good performances in terms of ACC, precision, and recall when compared to the recent related works.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":"6 3","pages":"311-320"},"PeriodicalIF":13.6,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8254253/10097649/10097662.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67999319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Impact of Mobile Technology and Use of Big Data in Physics Education During Coronavirus Lockdown 冠状病毒封锁期间移动技术和大数据在物理教育中的应用的影响
IF 13.6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-04-07 DOI: 10.26599/BDMA.2022.9020013
Edeh Michael Onyema;Rijwan Khan;Nwafor Chika Eucheria;Tribhuwan Kumar
The speed of spread of Coronavirus Disease 2019 led to global lockdowns and disruptions in the academic sector. The study examined the impact of mobile technology on physics education during lockdowns. Data were collected through an online survey and later evaluated using regression tools, frequency, and an analysis of variance (ANOVA). The findings revealed that the usage of mobile technology had statistically significant effects on physics instructors' and students' academics during the coronavirus lockdown. Most of the participants admitted that the use of mobile technologies such as smartphones, laptops, PDAs, Zoom, mobile apps, etc. were very useful and helpful for continued education amid the pandemic restrictions. Online teaching is very effective during lock-down with smartphones and laptops on different platforms. The paper brings the limelight to the growing power of mobile technology solutions in physics education.
2019冠状病毒疾病的传播速度导致了全球封锁和学术部门的混乱。这项研究考察了封锁期间移动技术对物理教育的影响。数据通过在线调查收集,随后使用回归工具、频率和方差分析(ANOVA)进行评估。研究结果显示,在冠状病毒封锁期间,移动技术的使用对物理老师和学生的学业产生了统计上的显著影响。大多数参与者承认,在疫情限制期间,使用智能手机、笔记本电脑、PDA、Zoom、移动应用程序等移动技术非常有用,有助于继续教育。在不同平台上使用智能手机和笔记本电脑进行封锁期间,在线教学非常有效。这篇论文引起了人们对移动技术解决方案在物理教育中日益强大的影响力的关注。
{"title":"Impact of Mobile Technology and Use of Big Data in Physics Education During Coronavirus Lockdown","authors":"Edeh Michael Onyema;Rijwan Khan;Nwafor Chika Eucheria;Tribhuwan Kumar","doi":"10.26599/BDMA.2022.9020013","DOIUrl":"https://doi.org/10.26599/BDMA.2022.9020013","url":null,"abstract":"The speed of spread of Coronavirus Disease 2019 led to global lockdowns and disruptions in the academic sector. The study examined the impact of mobile technology on physics education during lockdowns. Data were collected through an online survey and later evaluated using regression tools, frequency, and an analysis of variance (ANOVA). The findings revealed that the usage of mobile technology had statistically significant effects on physics instructors' and students' academics during the coronavirus lockdown. Most of the participants admitted that the use of mobile technologies such as smartphones, laptops, PDAs, Zoom, mobile apps, etc. were very useful and helpful for continued education amid the pandemic restrictions. Online teaching is very effective during lock-down with smartphones and laptops on different platforms. The paper brings the limelight to the growing power of mobile technology solutions in physics education.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":"6 3","pages":"381-389"},"PeriodicalIF":13.6,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8254253/10097649/10097656.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67838273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent Heuristic Manta-Ray Foraging Optimization and Adaptive Extreme Learning Machine for Hand Gesture Image Recognition 一种用于手势图像识别的智能启发式Manta Ray觅食优化和自适应极限学习机
IF 13.6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-04-07 DOI: 10.26599/BDMA.2022.9020036
Seetharam Khetavath;Navalpur Chinnappan Sendhilkumar;Pandurangan Mukunthan;Selvaganesan Jana;Subburayalu Gopalakrishnan;Lakshmanan Malliga;Sankuru Ravi Chand;Yousef Farhaoui
The development of hand gesture recognition systems has gained more attention in recent days, due to its support of modern human-computer interfaces. Moreover, sign language recognition is mainly developed for enabling communication between deaf and dumb people. In conventional works, various image processing techniques like segmentation, optimization, and classification are deployed for hand gesture recognition. Still, it limits the major problems of inefficient handling of large dimensional datasets and requires more time consumption, increased false positives, error rate, and misclassification outputs. Hence, this research work intends to develop an efficient hand gesture image recognition system by using advanced image processing techniques. During image segmentation, skin color detection and morphological operations are performed for accurately segmenting the hand gesture portion. Then, the Heuristic Manta-ray Foraging Optimization (HMFO) technique is employed for optimally selecting the features by computing the best fitness value. Moreover, the reduced dimensionality of features helps to increase the accuracy of classification with a reduced error rate. Finally, an Adaptive Extreme Learning Machine (AELM) based classification technique is employed for predicting the recognition output. During results validation, various evaluation measures have been used to compare the proposed model's performance with other classification approaches.
手势识别系统由于其对现代人机界面的支持,近年来得到了越来越多的关注。此外,手语识别主要是为了实现聋哑人之间的交流而开发的。在传统的工作中,手势识别采用了各种图像处理技术,如分割、优化和分类。尽管如此,它限制了大维数据集低效处理的主要问题,并需要更多的时间消耗、增加的误报、错误率和错误分类输出。因此,本研究旨在利用先进的图像处理技术开发一种高效的手势图像识别系统。在图像分割期间,执行肤色检测和形态学操作以精确地分割手势部分。然后,采用启发式蝠鲼觅食优化(HMFO)技术,通过计算最佳适应度值来优化选择特征。此外,特征的降维有助于在降低错误率的情况下提高分类的准确性。最后,采用基于自适应极限学习机(AELM)的分类技术来预测识别输出。在结果验证过程中,使用了各种评估措施来将所提出的模型的性能与其他分类方法进行比较。
{"title":"An Intelligent Heuristic Manta-Ray Foraging Optimization and Adaptive Extreme Learning Machine for Hand Gesture Image Recognition","authors":"Seetharam Khetavath;Navalpur Chinnappan Sendhilkumar;Pandurangan Mukunthan;Selvaganesan Jana;Subburayalu Gopalakrishnan;Lakshmanan Malliga;Sankuru Ravi Chand;Yousef Farhaoui","doi":"10.26599/BDMA.2022.9020036","DOIUrl":"https://doi.org/10.26599/BDMA.2022.9020036","url":null,"abstract":"The development of hand gesture recognition systems has gained more attention in recent days, due to its support of modern human-computer interfaces. Moreover, sign language recognition is mainly developed for enabling communication between deaf and dumb people. In conventional works, various image processing techniques like segmentation, optimization, and classification are deployed for hand gesture recognition. Still, it limits the major problems of inefficient handling of large dimensional datasets and requires more time consumption, increased false positives, error rate, and misclassification outputs. Hence, this research work intends to develop an efficient hand gesture image recognition system by using advanced image processing techniques. During image segmentation, skin color detection and morphological operations are performed for accurately segmenting the hand gesture portion. Then, the Heuristic Manta-ray Foraging Optimization (HMFO) technique is employed for optimally selecting the features by computing the best fitness value. Moreover, the reduced dimensionality of features helps to increase the accuracy of classification with a reduced error rate. Finally, an Adaptive Extreme Learning Machine (AELM) based classification technique is employed for predicting the recognition output. During results validation, various evaluation measures have been used to compare the proposed model's performance with other classification approaches.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":"6 3","pages":"321-335"},"PeriodicalIF":13.6,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8254253/10097649/10097660.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67837478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Extraction of Fetal Electrocardiogram by Combining Deep Learning and SVD-ICA-NMF Methods 深度学习与SVD-ICA-NMF相结合提取胎儿心电图
IF 13.6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-04-07 DOI: 10.26599/BDMA.2022.9020035
Said Ziani;Yousef Farhaoui;Mohammed Moutaib
This paper deals with detecting fetal electrocardiogram FECG signals from single-channel abdominal lead. It is based on the Convolutional Neural Network (CNN) combined with advanced mathematical methods, such as Independent Component Analysis (ICA), Singular Value Decomposition (SVD), and a dimension-reduction technique like Nonnegative Matrix Factorization (NMF). Due to the highly disproportionate frequency of the fetus's heart rate compared to the mother's, the time-scale representation clearly distinguishes the fetal electrical activity in terms of energy. Furthermore, we can disentangle the various components of fetal ECG, which serve as inputs to the CNN model to optimize the actual FECG signal, denoted by FECGr, which is recovered using the SVD-ICA process. The findings demonstrate the efficiency of this innovative approach, which may be deployed in real-time.
本文研究了单通道腹部导联胎儿心电图FECG信号的检测。它基于卷积神经网络(CNN),结合了独立分量分析(ICA)、奇异值分解(SVD)等先进的数学方法和非负矩阵分解(NMF)等降维技术。由于胎儿心率的频率与母亲心率的频率高度不相称,时间尺度表示可以清楚地从能量方面区分胎儿的电活动。此外,我们可以解开胎儿ECG的各种分量,这些分量用作CNN模型的输入,以优化实际的FECG信号,用FECGr表示,该信号使用SVD-ICA过程恢复。研究结果证明了这种创新方法的有效性,这种方法可以实时部署。
{"title":"Extraction of Fetal Electrocardiogram by Combining Deep Learning and SVD-ICA-NMF Methods","authors":"Said Ziani;Yousef Farhaoui;Mohammed Moutaib","doi":"10.26599/BDMA.2022.9020035","DOIUrl":"https://doi.org/10.26599/BDMA.2022.9020035","url":null,"abstract":"This paper deals with detecting fetal electrocardiogram FECG signals from single-channel abdominal lead. It is based on the Convolutional Neural Network (CNN) combined with advanced mathematical methods, such as Independent Component Analysis (ICA), Singular Value Decomposition (SVD), and a dimension-reduction technique like Nonnegative Matrix Factorization (NMF). Due to the highly disproportionate frequency of the fetus's heart rate compared to the mother's, the time-scale representation clearly distinguishes the fetal electrical activity in terms of energy. Furthermore, we can disentangle the various components of fetal ECG, which serve as inputs to the CNN model to optimize the actual FECG signal, denoted by FECGr, which is recovered using the SVD-ICA process. The findings demonstrate the efficiency of this innovative approach, which may be deployed in real-time.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":"6 3","pages":"301-310"},"PeriodicalIF":13.6,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8254253/10097649/10097661.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67837479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Artificial Intelligence Methods Applied to Catalytic Cracking Processes 人工智能方法在催化裂化过程中的应用
IF 13.6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-04-07 DOI: 10.26599/BDMA.2023.9020002
Fan Yang;Mao Xu;Wenqiang Lei;Jiancheng Lv
Fluidic Catalytic Cracking (FCC) is a complex petrochemical process affected by many highly non-linear and interrelated factors. Product yield analysis, flue gas desulfurization prediction, and abnormal condition warning are several key research directions in FCC. This paper will sort out the relevant research results of the existing Artificial Intelligence (AI) algorithms applied to the analysis and optimization of catalytic cracking processes, with a view to providing help for the follow-up research. Compared with the traditional mathematical mechanism method, the AI method can effectively solve the difficulties in FCC process modeling, such as high-dimensional, nonlinear, strong correlation, and large delay. AI methods applied in product yield analysis build models based on massive data. By fitting the functional relationship between operating variables and products, the excessive simplification of mechanism model can be avoided, resulting in high model accuracy. AI methods applied in flue gas desulfurization can be usually divided into two stages: modeling and optimization. In the modeling stage, data-driven methods are often used to build the system model or rule base; In the optimization stage, heuristic search or reinforcement learning methods can be applied to find the optimal operating parameters based on the constructed model or rule base. AI methods, including data-driven and knowledge-driven algorithms, are widely used in the abnormal condition warning. Knowledge-driven methods have advantages in interpretability and generalization, but disadvantages in construction difficulty and prediction recall. While the data-driven methods are just the opposite. Thus, some studies combine these two methods to obtain better results.
流化催化裂化是一个复杂的石油化工过程,受到许多高度非线性和相互关联的因素的影响。产品收率分析、烟气脱硫预测和异常状态预警是催化裂化的几个关键研究方向。本文将梳理现有人工智能算法应用于催化裂化工艺分析和优化的相关研究成果,以期为后续研究提供帮助。与传统的数学机理方法相比,人工智能方法可以有效地解决催化裂化过程建模中的高维、非线性、强相关性和大延迟等困难。应用于产品产量分析的人工智能方法基于海量数据构建模型。通过拟合操作变量与产品之间的函数关系,可以避免机构模型的过度简化,从而获得较高的模型精度。人工智能方法在烟气脱硫中的应用通常可分为建模和优化两个阶段。在建模阶段,通常使用数据驱动的方法来建立系统模型或规则库;在优化阶段,可以应用启发式搜索或强化学习方法,基于构建的模型或规则库来找到最佳操作参数。人工智能方法,包括数据驱动和知识驱动的算法,广泛应用于异常状态预警。知识驱动方法在可解释性和泛化方面具有优势,但在构造难度和预测召回方面存在不足。而数据驱动的方法恰恰相反。因此,一些研究将这两种方法结合起来以获得更好的结果。
{"title":"Artificial Intelligence Methods Applied to Catalytic Cracking Processes","authors":"Fan Yang;Mao Xu;Wenqiang Lei;Jiancheng Lv","doi":"10.26599/BDMA.2023.9020002","DOIUrl":"https://doi.org/10.26599/BDMA.2023.9020002","url":null,"abstract":"Fluidic Catalytic Cracking (FCC) is a complex petrochemical process affected by many highly non-linear and interrelated factors. Product yield analysis, flue gas desulfurization prediction, and abnormal condition warning are several key research directions in FCC. This paper will sort out the relevant research results of the existing Artificial Intelligence (AI) algorithms applied to the analysis and optimization of catalytic cracking processes, with a view to providing help for the follow-up research. Compared with the traditional mathematical mechanism method, the AI method can effectively solve the difficulties in FCC process modeling, such as high-dimensional, nonlinear, strong correlation, and large delay. AI methods applied in product yield analysis build models based on massive data. By fitting the functional relationship between operating variables and products, the excessive simplification of mechanism model can be avoided, resulting in high model accuracy. AI methods applied in flue gas desulfurization can be usually divided into two stages: modeling and optimization. In the modeling stage, data-driven methods are often used to build the system model or rule base; In the optimization stage, heuristic search or reinforcement learning methods can be applied to find the optimal operating parameters based on the constructed model or rule base. AI methods, including data-driven and knowledge-driven algorithms, are widely used in the abnormal condition warning. Knowledge-driven methods have advantages in interpretability and generalization, but disadvantages in construction difficulty and prediction recall. While the data-driven methods are just the opposite. Thus, some studies combine these two methods to obtain better results.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":"6 3","pages":"361-380"},"PeriodicalIF":13.6,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8254253/10097649/10097651.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67838275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers 使用局部特征提取器和优化分类器验证图像中的复制-移动伪造
IF 13.6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-04-07 DOI: 10.26599/BDMA.2022.9020029
S. B. G. Tilak Babu;Ch Srinivasa Rao
Passive image forgery detection methods that identify forgeries without prior knowledge have become a key research focus. In copy-move forgery, the assailant intends to hide a portion of an image by pasting other portions of the same image. The detection of such manipulations in images has great demand in legal evidence, forensic investigation, and many other fields. The paper aims to present copy-move forgery detection algorithms with the help of advanced feature descriptors, such as local ternary pattern, local phase quantization, local Gabor binary pattern histogram sequence, Weber local descriptor, and local monotonic pattern, and classifiers such as optimized support vector machine and optimized NBC. The proposed algorithms can classify an image efficiently as either copy-move forged or authenticated, even if the test image is subjected to attacks such as JPEG compression, scaling, rotation, and brightness variation. CoMoFoD, CASIA, and MICC datasets and a combination of CoMoFoD and CASIA datasets images are used to quantify the performance of the proposed algorithms. The proposed algorithms are more efficient than state-of-the-art algorithms even though the suspected image is post-processed.
在没有先验知识的情况下识别伪造品的被动图像伪造检测方法已成为研究的重点。在复制移动伪造中,攻击者意图通过粘贴同一图像的其他部分来隐藏图像的一部分。在法律证据、法医学调查和许多其他领域,对图像中的此类操作的检测有很大的需求。本文旨在借助先进的特征描述符,如局部三元模式、局部相位量化、局部Gabor二进制模式直方图序列、Weber局部描述符和局部单调模式,以及分类器,如优化支持向量机和优化NBC,提出复制移动伪造检测算法。即使测试图像受到JPEG压缩、缩放、旋转和亮度变化等攻击,所提出的算法也可以有效地将图像分类为复制移动伪造或认证。CoMoFoD、CASIA和MICC数据集以及CoMoFoD和CASIA数据集图像的组合用于量化所提出算法的性能。所提出的算法比现有技术的算法更有效,即使可疑图像是后处理的。
{"title":"Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers","authors":"S. B. G. Tilak Babu;Ch Srinivasa Rao","doi":"10.26599/BDMA.2022.9020029","DOIUrl":"https://doi.org/10.26599/BDMA.2022.9020029","url":null,"abstract":"Passive image forgery detection methods that identify forgeries without prior knowledge have become a key research focus. In copy-move forgery, the assailant intends to hide a portion of an image by pasting other portions of the same image. The detection of such manipulations in images has great demand in legal evidence, forensic investigation, and many other fields. The paper aims to present copy-move forgery detection algorithms with the help of advanced feature descriptors, such as local ternary pattern, local phase quantization, local Gabor binary pattern histogram sequence, Weber local descriptor, and local monotonic pattern, and classifiers such as optimized support vector machine and optimized NBC. The proposed algorithms can classify an image efficiently as either copy-move forged or authenticated, even if the test image is subjected to attacks such as JPEG compression, scaling, rotation, and brightness variation. CoMoFoD, CASIA, and MICC datasets and a combination of CoMoFoD and CASIA datasets images are used to quantify the performance of the proposed algorithms. The proposed algorithms are more efficient than state-of-the-art algorithms even though the suspected image is post-processed.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":"6 3","pages":"347-360"},"PeriodicalIF":13.6,"publicationDate":"2023-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8254253/10097649/10097650.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67838277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Security and Privacy in Metaverse: A Comprehensive Survey Metaverse中的安全与隐私:综述
IF 13.6 1区 计算机科学 Q1 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2023-01-26 DOI: 10.26599/BDMA.2022.9020047
Yan Huang;Yi Joy Li;Zhipeng Cai
Metaverse describes a new shape of cyberspace and has become a hot-trending word since 2021. There are many explanations about what Meterverse is and attempts to provide a formal standard or definition of Metaverse. However, these definitions could hardly reach universal acceptance. Rather than providing a formal definition of the Metaverse, we list four must-have characteristics of the Metaverse: socialization, immersive interaction, real world-building, and expandability. These characteristics not only carve the Metaverse into a novel and fantastic digital world, but also make it suffer from all security/privacy risks, such as personal information leakage, eavesdropping, unauthorized access, phishing, data injection, broken authentication, insecure design, and more. This paper first introduces the four characteristics, then the current progress and typical applications of the Metaverse are surveyed and categorized into four economic sectors. Based on the four characteristics and the findings of the current progress, the security and privacy issues in the Metaverse are investigated. We then identify and discuss more potential critical security and privacy issues that can be caused by combining the four characteristics. Lastly, the paper also raises some other concerns regarding society and humanity.
元宇宙描述了一种新的网络空间形态,自2021年以来已成为热门词汇。关于Meterverse是什么,有很多解释,并试图提供元宇宙的正式标准或定义。然而,这些定义很难得到普遍接受。我们没有提供元宇宙的正式定义,而是列出了元宇宙的四个必备特征:社交化、沉浸式互动、现实世界构建和可扩展性。这些特征不仅将元宇宙塑造成一个新奇而奇妙的数字世界,还使其面临所有安全/隐私风险,如个人信息泄露、窃听、未经授权访问、网络钓鱼、数据注入、身份验证失败、设计不安全等。本文首先介绍了元宇宙的四个特点,然后对元宇宙的当前进展和典型应用进行了综述,并将其分为四个经济领域。基于这四个特征和当前进展的发现,对元宇宙中的安全和隐私问题进行了研究。然后,我们确定并讨论了结合这四个特征可能导致的更多潜在的关键安全和隐私问题。最后,本文还提出了一些关于社会和人性的其他问题。
{"title":"Security and Privacy in Metaverse: A Comprehensive Survey","authors":"Yan Huang;Yi Joy Li;Zhipeng Cai","doi":"10.26599/BDMA.2022.9020047","DOIUrl":"https://doi.org/10.26599/BDMA.2022.9020047","url":null,"abstract":"Metaverse describes a new shape of cyberspace and has become a hot-trending word since 2021. There are many explanations about what Meterverse is and attempts to provide a formal standard or definition of Metaverse. However, these definitions could hardly reach universal acceptance. Rather than providing a formal definition of the Metaverse, we list four must-have characteristics of the Metaverse: socialization, immersive interaction, real world-building, and expandability. These characteristics not only carve the Metaverse into a novel and fantastic digital world, but also make it suffer from all security/privacy risks, such as personal information leakage, eavesdropping, unauthorized access, phishing, data injection, broken authentication, insecure design, and more. This paper first introduces the four characteristics, then the current progress and typical applications of the Metaverse are surveyed and categorized into four economic sectors. Based on the four characteristics and the findings of the current progress, the security and privacy issues in the Metaverse are investigated. We then identify and discuss more potential critical security and privacy issues that can be caused by combining the four characteristics. Lastly, the paper also raises some other concerns regarding society and humanity.","PeriodicalId":52355,"journal":{"name":"Big Data Mining and Analytics","volume":"6 2","pages":"234-247"},"PeriodicalIF":13.6,"publicationDate":"2023-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/8254253/10026288/10026513.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67984888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
期刊
Big Data Mining and Analytics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1