首页 > 最新文献

PeerJ Computer Science最新文献

英文 中文
Detection of unsafe workplace behaviors: Sec-YOLO model with FEHA attention. 不安全工作场所行为的检测:FEHA关注的Sec-YOLO模型。
IF 2.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-09-03 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.3151
Yang Liu, Shuaixian Liu, Jie Gao, Tao Song, Wenyu Dong

Detecting unsafe human behaviors is crucial for enhancing safety in industrial production environments. Current models face limitations in multi-scale target detection within such settings. This study introduces a novel model, Sec-YOLO, which is specifically designed for detecting unsafe behaviors. Firstly, the model incorporates a receptive-field attention convolution (RFAConv) module to better focus on the key features of unsafe behaviors. Secondly, a deformable convolution network v2 (DCNv2) is integrated into the C2f module to enhance the model's adaptability to the continually changing feature structures of unsafe behaviors. Additionally, inspired by the multi-branch auxiliary feature pyramid network (MAFPN) structure, the neck architecture of the model has been restructured. Importantly, to improve feature extraction and fusion, feature-enhanced hybrid attention (FEHA) is introduced and integrated with DCNv2 and MAFPN. Experimental results demonstrate that Sec-YOLO achieves a mean average precision (mAP) at 0.5 of 92.6% and mAP at 0.5:0.95 of 63.6% on a custom dataset comprising four common unsafe behaviors: falling, sleeping at the post, using mobile phones, and not wearing safety helmets. These results represent a 2.0% and 2.5% improvement over the YOLOv8n model. Sec-YOLO exhibits excellent performance in practical applications, focusing more precisely on feature handling and detection.

检测不安全的人类行为对于加强工业生产环境的安全至关重要。在这种情况下,当前的模型在多尺度目标检测方面存在局限性。本研究引入了一种新的模型Sec-YOLO,该模型是专门为检测不安全行为而设计的。首先,该模型结合了一个接受场注意卷积(RFAConv)模块,以更好地关注不安全行为的关键特征。其次,在C2f模块中集成了可变形卷积网络v2 (DCNv2),增强了模型对不断变化的不安全行为特征结构的适应性;此外,受多分支辅助特征金字塔网络(MAFPN)结构的启发,对模型的颈部结构进行了重构。重要的是,为了改进特征提取和融合,引入了特征增强混合注意(FEHA),并将其与DCNv2和MAFPN相集成。实验结果表明,在包含跌倒、在岗前睡觉、使用手机和不戴安全帽四种常见不安全行为的自定义数据集上,Sec-YOLO的平均精度(mAP)为92.6%的0.5,mAP为63.6%的0.5:0.95。这些结果比YOLOv8n模型分别提高了2.0%和2.5%。Sec-YOLO在实际应用中表现出优异的性能,更精确地关注特征处理和检测。
{"title":"Detection of unsafe workplace behaviors: Sec-YOLO model with FEHA attention.","authors":"Yang Liu, Shuaixian Liu, Jie Gao, Tao Song, Wenyu Dong","doi":"10.7717/peerj-cs.3151","DOIUrl":"10.7717/peerj-cs.3151","url":null,"abstract":"<p><p>Detecting unsafe human behaviors is crucial for enhancing safety in industrial production environments. Current models face limitations in multi-scale target detection within such settings. This study introduces a novel model, Sec-YOLO, which is specifically designed for detecting unsafe behaviors. Firstly, the model incorporates a receptive-field attention convolution (RFAConv) module to better focus on the key features of unsafe behaviors. Secondly, a deformable convolution network v2 (DCNv2) is integrated into the C2f module to enhance the model's adaptability to the continually changing feature structures of unsafe behaviors. Additionally, inspired by the multi-branch auxiliary feature pyramid network (MAFPN) structure, the neck architecture of the model has been restructured. Importantly, to improve feature extraction and fusion, feature-enhanced hybrid attention (FEHA) is introduced and integrated with DCNv2 and MAFPN. Experimental results demonstrate that Sec-YOLO achieves a mean average precision (mAP) at 0.5 of 92.6% and mAP at 0.5:0.95 of 63.6% on a custom dataset comprising four common unsafe behaviors: falling, sleeping at the post, using mobile phones, and not wearing safety helmets. These results represent a 2.0% and 2.5% improvement over the YOLOv8n model. Sec-YOLO exhibits excellent performance in practical applications, focusing more precisely on feature handling and detection.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3151"},"PeriodicalIF":2.5,"publicationDate":"2025-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453777/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introducing the municipal digital offering index for evaluating online services and addressing the digital divide. 引入市政数字服务指数,以评估在线服务,解决数字鸿沟。
IF 2.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-09-03 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.3049
Carolina Busco, Felipe González, Paula Farina, Jonathan Vivas, Fernanda Saavedra, Lizbeth Avalos

This research introduces the Municipal Digital Offering Index (MDOI) to assess municipal online service development in Chile. The study utilizes content analysis of municipal websites, creating a systematic instrument to evaluate digital services. It evaluates all 344 Chilean municipalities based on 163 dichotomous variables. Through factor analysis and regression modeling, it investigates sociodemographic and economic factors influencing digital development at the municipal level, offering insights into the digital divide across municipalities. The findings highlight geographical disparities and indicate priority intervention areas. While education levels and financial resources influence digital technology adoption, many municipalities lack efficient online procedures, prompting focused digital transformation investments. This research emphasizes the importance of localized digital services in bridging the digital divide and promoting inclusive governance.

本研究引入市政数字服务指数(MDOI)来评估智利市政在线服务的发展。本研究利用市政网站的内容分析,创建一个系统的工具来评估数字服务。它基于163个二分变量对智利344个城市进行了评估。通过因子分析和回归模型,研究了影响城市数字发展的社会人口和经济因素,为城市之间的数字鸿沟提供了见解。研究结果突出了地域差异,并指出了优先干预领域。虽然教育水平和财政资源影响数字技术的采用,但许多市政当局缺乏有效的在线程序,因此需要集中进行数字化转型投资。本研究强调了本地化数字服务在弥合数字鸿沟和促进包容性治理方面的重要性。
{"title":"Introducing the municipal digital offering index for evaluating online services and addressing the digital divide.","authors":"Carolina Busco, Felipe González, Paula Farina, Jonathan Vivas, Fernanda Saavedra, Lizbeth Avalos","doi":"10.7717/peerj-cs.3049","DOIUrl":"10.7717/peerj-cs.3049","url":null,"abstract":"<p><p>This research introduces the Municipal Digital Offering Index (MDOI) to assess municipal online service development in Chile. The study utilizes content analysis of municipal websites, creating a systematic instrument to evaluate digital services. It evaluates all 344 Chilean municipalities based on 163 dichotomous variables. Through factor analysis and regression modeling, it investigates sociodemographic and economic factors influencing digital development at the municipal level, offering insights into the digital divide across municipalities. The findings highlight geographical disparities and indicate priority intervention areas. While education levels and financial resources influence digital technology adoption, many municipalities lack efficient online procedures, prompting focused digital transformation investments. This research emphasizes the importance of localized digital services in bridging the digital divide and promoting inclusive governance.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3049"},"PeriodicalIF":2.5,"publicationDate":"2025-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453795/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cluster-assisted differential evolution-based hybrid oversampling method for imbalanced datasets. 一种基于聚类辅助差分进化的不平衡数据混合过采样方法。
IF 2.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-09-02 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.3177
Muhammed Abdulhamid Karabiyik, Bahaeddin Turkoglu, Tunc Asuroglu

Class imbalance remains a significant challenge in machine learning, leading to biased models that favor the majority class while failing to accurately classify minority instances. Traditional oversampling methods, such as Synthetic Minority Over-sampling Technique (SMOTE) and its variants, often struggle with class overlap, poor decision boundary representation, and noise accumulation. To address these limitations, this study introduces ClusterDEBO, a novel hybrid oversampling method that integrates K-Means clustering with differential evolution (DE) to generate synthetic samples in a more structured and adaptive manner. The proposed method first partitions the minority class into clusters using the silhouette score to determine the optimal number of clusters. Within each cluster, DE-based mutation and crossover operations are applied to generate diverse and well-distributed synthetic samples while preserving the underlying data distribution. Additionally, a selective sampling and noise reduction mechanism is employed to filter out low-impact synthetic samples based on their contribution to classification performance. The effectiveness of ClusterDEBO is evaluated on 44 benchmark datasets using k-Nearest Neighbors (kNN), decision tree (DT), and support vector machines (SVM) as classifiers. The results demonstrate that ClusterDEBO consistently outperforms existing oversampling techniques, leading to improved class separability and enhanced classifier robustness. Moreover, statistical validation using the Friedman test confirms the significance of the improvements, ensuring that the observed gains are not due to random variations. The findings highlight the potential of cluster-assisted differential evolution as a powerful strategy for handling imbalanced datasets.

类不平衡仍然是机器学习中的一个重大挑战,导致偏向多数类的模型无法准确分类少数类实例。传统的过采样方法,如合成少数过采样技术(SMOTE)及其变体,经常受到类重叠、决策边界表示差和噪声积累的困扰。为了解决这些限制,本研究引入了ClusterDEBO,这是一种新的混合过采样方法,将k均值聚类与差分进化(DE)相结合,以更结构化和自适应的方式生成合成样本。该方法首先利用剪影分数将少数类划分为簇,确定最优簇数;在每个聚类中,应用基于de的突变和交叉操作来生成多样化且分布良好的合成样本,同时保留底层数据分布。此外,采用选择性采样和降噪机制,根据对分类性能的贡献过滤出低影响的合成样本。使用k-最近邻(kNN)、决策树(DT)和支持向量机(SVM)作为分类器,在44个基准数据集上评估了ClusterDEBO的有效性。结果表明,ClusterDEBO始终优于现有的过采样技术,从而提高了类可分离性和增强了分类器的鲁棒性。此外,使用Friedman检验的统计验证证实了改进的重要性,确保观察到的增益不是由于随机变化。这些发现突出了集群辅助差异进化作为处理不平衡数据集的强大策略的潜力。
{"title":"A cluster-assisted differential evolution-based hybrid oversampling method for imbalanced datasets.","authors":"Muhammed Abdulhamid Karabiyik, Bahaeddin Turkoglu, Tunc Asuroglu","doi":"10.7717/peerj-cs.3177","DOIUrl":"10.7717/peerj-cs.3177","url":null,"abstract":"<p><p>Class imbalance remains a significant challenge in machine learning, leading to biased models that favor the majority class while failing to accurately classify minority instances. Traditional oversampling methods, such as Synthetic Minority Over-sampling Technique (SMOTE) and its variants, often struggle with class overlap, poor decision boundary representation, and noise accumulation. To address these limitations, this study introduces ClusterDEBO, a novel hybrid oversampling method that integrates K-Means clustering with differential evolution (DE) to generate synthetic samples in a more structured and adaptive manner. The proposed method first partitions the minority class into clusters using the silhouette score to determine the optimal number of clusters. Within each cluster, DE-based mutation and crossover operations are applied to generate diverse and well-distributed synthetic samples while preserving the underlying data distribution. Additionally, a selective sampling and noise reduction mechanism is employed to filter out low-impact synthetic samples based on their contribution to classification performance. The effectiveness of ClusterDEBO is evaluated on 44 benchmark datasets using k-Nearest Neighbors (kNN), decision tree (DT), and support vector machines (SVM) as classifiers. The results demonstrate that ClusterDEBO consistently outperforms existing oversampling techniques, leading to improved class separability and enhanced classifier robustness. Moreover, statistical validation using the Friedman test confirms the significance of the improvements, ensuring that the observed gains are not due to random variations. The findings highlight the potential of cluster-assisted differential evolution as a powerful strategy for handling imbalanced datasets.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3177"},"PeriodicalIF":2.5,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453762/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing credit card fraud detection with a stacking-based hybrid machine learning approach. 基于堆叠的混合机器学习方法增强信用卡欺诈检测。
IF 2.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-09-02 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.3007
Eyad Abdel Latif Marazqah Btoush, Xujuan Zhou, Raj Gururajan, Ka Ching Chan, Omar Alsodi

The swift progression of technology has increased the complexity of cyber fraud, posing an escalating challenge for the banking sector to reliably and efficiently identify fraudulent credit card transactions. Conventional detection approaches fail to adapt to the advancing strategies of fraudsters, resulting in heightened false positives and inefficiency within fraud detection systems. This study overcomes these restrictions by creating an innovative stacking hybrid machine learning (ML) approach that combines decision trees (DT), random forests (RF), support vector machines (SVM), XGBoost, CatBoost, and logistic regression (LR) within a stacking ensemble framework. This method uses stacking to integrate diverse ML models, enhancing predictive performance, with a meta-model consolidating base model predictions, resulting in superior detection accuracy compared to any single model. The methodology utilizes sophisticated data preprocessing techniques, such as correlation-based feature selection and principal component analysis (PCA), to enhance computing efficiency while preserving essential information. Experimental assessments of a credit card transaction dataset reveal that the stacking ensemble model exhibits higher performance, achieving an F1-score of 88.14%, thereby efficiently balancing precision and recall. This outcome highlights the significance of ensemble methods such as stacking in attaining strong and dependable cyber fraud detection, emphasizing its capacity to markedly enhance the security of financial transactions.

技术的迅速发展增加了网络欺诈的复杂性,对银行业可靠、有效地识别欺诈性信用卡交易提出了越来越大的挑战。传统的检测方法不能适应欺诈者的先进策略,导致假阳性增加,欺诈检测系统效率低下。本研究通过创建一种创新的堆叠混合机器学习(ML)方法来克服这些限制,该方法将决策树(DT)、随机森林(RF)、支持向量机(SVM)、XGBoost、CatBoost和逻辑回归(LR)结合在一个堆叠集成框架内。该方法使用堆叠来集成不同的ML模型,增强预测性能,并使用元模型巩固基本模型预测,与任何单一模型相比,产生更高的检测精度。该方法利用复杂的数据预处理技术,如基于相关性的特征选择和主成分分析(PCA),以提高计算效率,同时保留重要信息。对信用卡交易数据集的实验评估表明,堆叠集成模型表现出更高的性能,达到了88.14%的f1分,从而有效地平衡了准确率和召回率。这一结果突出了集成方法(如堆叠)在实现强大而可靠的网络欺诈检测方面的重要性,强调了其显著提高金融交易安全性的能力。
{"title":"Enhancing credit card fraud detection with a stacking-based hybrid machine learning approach.","authors":"Eyad Abdel Latif Marazqah Btoush, Xujuan Zhou, Raj Gururajan, Ka Ching Chan, Omar Alsodi","doi":"10.7717/peerj-cs.3007","DOIUrl":"10.7717/peerj-cs.3007","url":null,"abstract":"<p><p>The swift progression of technology has increased the complexity of cyber fraud, posing an escalating challenge for the banking sector to reliably and efficiently identify fraudulent credit card transactions. Conventional detection approaches fail to adapt to the advancing strategies of fraudsters, resulting in heightened false positives and inefficiency within fraud detection systems. This study overcomes these restrictions by creating an innovative stacking hybrid machine learning (ML) approach that combines decision trees (DT), random forests (RF), support vector machines (SVM), XGBoost, CatBoost, and logistic regression (LR) within a stacking ensemble framework. This method uses stacking to integrate diverse ML models, enhancing predictive performance, with a meta-model consolidating base model predictions, resulting in superior detection accuracy compared to any single model. The methodology utilizes sophisticated data preprocessing techniques, such as correlation-based feature selection and principal component analysis (PCA), to enhance computing efficiency while preserving essential information. Experimental assessments of a credit card transaction dataset reveal that the stacking ensemble model exhibits higher performance, achieving an F1-score of 88.14%, thereby efficiently balancing precision and recall. This outcome highlights the significance of ensemble methods such as stacking in attaining strong and dependable cyber fraud detection, emphasizing its capacity to markedly enhance the security of financial transactions.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3007"},"PeriodicalIF":2.5,"publicationDate":"2025-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453863/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing a 3D convolutional neural network to detect Alzheimer's disease based on MRI. 优化基于MRI的三维卷积神经网络检测阿尔茨海默病。
IF 2.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-08-29 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.3129
Maitha Alarjani, Abdulmajeed Almuaibed

Alzheimer's disease (AD) is a progressive neurological disorder that affects millions worldwide, leading to cognitive decline and memory impairment. Structural changes in the brain gradually impair cognitive functions, and by the time symptoms become evident, significant and often irreversible neuronal damage has already occurred. This makes early diagnosis critical, as timely intervention can help slow disease progression and improve patients' quality of life. Recent advancements in machine learning and neuroimaging have enabled early detection of AD using imaging data and computer-aided diagnostic systems. Deep learning, particularly with magnetic resonance imaging (MRI), has gained widespread recognition for its ability to extract high-level features by leveraging localized connections, weight sharing, and three-dimensional invariance. In this study, we present a 3d convolutional neural network (3D-CNN) designed to enhance classification accuracy using data from the latest version of the OASIS database (OASIS-3). Unlike traditional 2D approaches, our model processes full 3D MRI scans to preserve spatial information and prevent information loss during dimensionality reduction. Additionally, we applied advanced preprocessing techniques, including intensity normalization and noise reduction, to enhance image quality and improve classification performance. Our proposed 3D-CNN achieved an impressive classification accuracy of 91%, outperforming several existing models. These results highlight the potential of deep learning in developing more reliable and efficient diagnostic tools for early Alzheimer's detection, paving the way for improved clinical decision-making and patient outcomes.

阿尔茨海默病(AD)是一种进行性神经系统疾病,影响全球数百万人,导致认知能力下降和记忆障碍。大脑的结构变化逐渐损害认知功能,当症状变得明显时,已经发生了重大且往往不可逆转的神经元损伤。这使得早期诊断至关重要,因为及时干预可以帮助减缓疾病进展并改善患者的生活质量。机器学习和神经成像的最新进展使得使用成像数据和计算机辅助诊断系统能够早期发现AD。深度学习,特别是磁共振成像(MRI),因其通过利用局部连接、权重共享和三维不变性来提取高级特征的能力而获得广泛认可。在这项研究中,我们提出了一个3d卷积神经网络(3d - cnn),旨在利用最新版本的OASIS数据库(OASIS-3)的数据提高分类精度。与传统的2D方法不同,我们的模型处理完整的3D MRI扫描,以保留空间信息并防止在降维过程中信息丢失。此外,我们采用了先进的预处理技术,包括强度归一化和降噪,以提高图像质量和提高分类性能。我们提出的3D-CNN实现了令人印象深刻的91%的分类准确率,优于现有的几个模型。这些结果突出了深度学习在开发更可靠、更有效的早期阿尔茨海默病诊断工具方面的潜力,为改善临床决策和患者预后铺平了道路。
{"title":"Optimizing a 3D convolutional neural network to detect Alzheimer's disease based on MRI.","authors":"Maitha Alarjani, Abdulmajeed Almuaibed","doi":"10.7717/peerj-cs.3129","DOIUrl":"10.7717/peerj-cs.3129","url":null,"abstract":"<p><p>Alzheimer's disease (AD) is a progressive neurological disorder that affects millions worldwide, leading to cognitive decline and memory impairment. Structural changes in the brain gradually impair cognitive functions, and by the time symptoms become evident, significant and often irreversible neuronal damage has already occurred. This makes early diagnosis critical, as timely intervention can help slow disease progression and improve patients' quality of life. Recent advancements in machine learning and neuroimaging have enabled early detection of AD using imaging data and computer-aided diagnostic systems. Deep learning, particularly with magnetic resonance imaging (MRI), has gained widespread recognition for its ability to extract high-level features by leveraging localized connections, weight sharing, and three-dimensional invariance. In this study, we present a 3d convolutional neural network (3D-CNN) designed to enhance classification accuracy using data from the latest version of the OASIS database (OASIS-3). Unlike traditional 2D approaches, our model processes full 3D MRI scans to preserve spatial information and prevent information loss during dimensionality reduction. Additionally, we applied advanced preprocessing techniques, including intensity normalization and noise reduction, to enhance image quality and improve classification performance. Our proposed 3D-CNN achieved an impressive classification accuracy of 91%, outperforming several existing models. These results highlight the potential of deep learning in developing more reliable and efficient diagnostic tools for early Alzheimer's detection, paving the way for improved clinical decision-making and patient outcomes.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3129"},"PeriodicalIF":2.5,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453851/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An End-to-End autonomous driving model based on visual perception for temporary roads. 基于视觉感知的临时道路端到端自动驾驶模型。
IF 2.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-08-29 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.3152
Qinghua Su, Min Xie, Liyong Wang, Yue Song, Ao Cui, Zhihao Xie

Background: The research on autonomous driving using deep learning has made significant progress on structured roads, but there has been limited research on temporary roads. The End-to-End autonomous driving model is highly integrated, allowing for the direct translation of input data into desired driving actions. This method eliminates inter-module coupling, thereby enhancing the safety and stability of autonomous vehicles.

Methods: Therefore, we propose a novel End-to-End model for autonomous driving on temporary roads specifically designed for mobile robots. The model takes three road images as input, extracts image features using the Global Context Vision Transformer (GCViT) network, plans local paths through a Transformer network and a gated recurrent unit (GRU) network, and finally outputs the steering angle through a control model to manage the automatic tracking of unmanned ground vehicles. To verify the model performance, both simulation tests and field tests were conducted.

Results: The experimental results demonstrate that our End-to-End model accurately identifies temporary roads. The trajectory planning time for a single frame is approximately 100 ms, while the average trajectory deviation is 0.689 m. This performance meets the real-time processing requirements for low-speed vehicles, enabling unmanned vehicles to execute tracking tasks in temporary road environments.

背景:基于深度学习的自动驾驶研究在结构化道路上取得了重大进展,但在临时道路上的研究有限。端到端自动驾驶模型高度集成,允许将输入数据直接转换为所需的驾驶动作。该方法消除了模块间的耦合,提高了自动驾驶车辆的安全性和稳定性。因此,我们提出了一种新颖的端到端模型,用于移动机器人在临时道路上的自动驾驶。该模型以三幅道路图像为输入,利用Global Context Vision Transformer (GCViT)网络提取图像特征,通过Transformer网络和门控循环单元(GRU)网络规划局部路径,最后通过控制模型输出转向角,实现无人驾驶地面车辆的自动跟踪管理。为了验证模型的性能,进行了仿真试验和现场试验。结果:实验结果表明,我们的端到端模型能够准确地识别临时道路。单帧轨迹规划时间约为100 ms,平均轨迹偏差为0.689 m。该性能满足低速车辆的实时处理要求,使无人驾驶车辆能够在临时道路环境中执行跟踪任务。
{"title":"An End-to-End autonomous driving model based on visual perception for temporary roads.","authors":"Qinghua Su, Min Xie, Liyong Wang, Yue Song, Ao Cui, Zhihao Xie","doi":"10.7717/peerj-cs.3152","DOIUrl":"https://doi.org/10.7717/peerj-cs.3152","url":null,"abstract":"<p><strong>Background: </strong>The research on autonomous driving using deep learning has made significant progress on structured roads, but there has been limited research on temporary roads. The End-to-End autonomous driving model is highly integrated, allowing for the direct translation of input data into desired driving actions. This method eliminates inter-module coupling, thereby enhancing the safety and stability of autonomous vehicles.</p><p><strong>Methods: </strong>Therefore, we propose a novel End-to-End model for autonomous driving on temporary roads specifically designed for mobile robots. The model takes three road images as input, extracts image features using the Global Context Vision Transformer (GCViT) network, plans local paths through a Transformer network and a gated recurrent unit (GRU) network, and finally outputs the steering angle through a control model to manage the automatic tracking of unmanned ground vehicles. To verify the model performance, both simulation tests and field tests were conducted.</p><p><strong>Results: </strong>The experimental results demonstrate that our End-to-End model accurately identifies temporary roads. The trajectory planning time for a single frame is approximately 100 ms, while the average trajectory deviation is 0.689 m. This performance meets the real-time processing requirements for low-speed vehicles, enabling unmanned vehicles to execute tracking tasks in temporary road environments.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3152"},"PeriodicalIF":2.5,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453871/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic generation of explanations in autonomous systems: enhancing human interaction in smart home environments. 自主系统中的自动生成解释:增强智能家居环境中的人类互动。
IF 2.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-08-29 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.3041
Oscar Peña-Cáceres, Antoni Mestre, Manoli Albert, Vicente Pelechano, Miriam Gil

In smart environments, autonomous systems often adapt their behavior to the context, and although such adaptations are generally beneficial, they may cause users to struggle to understand or trust them. To address this, we propose an explanation generation system that produces natural language descriptions (explanations) to clarify the adaptive behavior of smart home systems in runtime. These explanations are customized based on user characteristics and the contextual information derived from the user interactions with the system. Our approach leverages a prompt-based strategy using a fine-tuned large language model, guided by a modular template that integrates key data such as the type of explanation to be generated, user profile, runtime system information, interaction history, and the specific nature of the system adaptation. As a preliminary step, we also present a conceptual model that characterize explanations in the domain of autonomous systems by defining their core concepts. Finally, we evaluate the user experience of the generated explanations through an experiment involving 118 participants. Results show that generated explanations are perceived positive and with high level of acceptance.

在智能环境中,自主系统经常根据上下文调整其行为,尽管这种调整通常是有益的,但它们可能会导致用户难以理解或信任它们。为了解决这个问题,我们提出了一个解释生成系统,该系统产生自然语言描述(解释),以澄清智能家居系统在运行时的自适应行为。这些解释是根据用户特征和来自用户与系统交互的上下文信息定制的。我们的方法利用基于提示的策略,使用经过微调的大型语言模型,由模块化模板指导,该模板集成了关键数据,如要生成的解释类型、用户配置文件、运行时系统信息、交互历史以及系统适应的特定性质。作为初步步骤,我们还提出了一个概念模型,通过定义自治系统的核心概念来表征自治系统领域的解释。最后,我们通过一个涉及118名参与者的实验来评估生成的解释的用户体验。结果表明,生成的解释被认为是积极的,并具有较高的接受程度。
{"title":"Automatic generation of explanations in autonomous systems: enhancing human interaction in smart home environments.","authors":"Oscar Peña-Cáceres, Antoni Mestre, Manoli Albert, Vicente Pelechano, Miriam Gil","doi":"10.7717/peerj-cs.3041","DOIUrl":"https://doi.org/10.7717/peerj-cs.3041","url":null,"abstract":"<p><p>In smart environments, autonomous systems often adapt their behavior to the context, and although such adaptations are generally beneficial, they may cause users to struggle to understand or trust them. To address this, we propose an explanation generation system that produces natural language descriptions (explanations) to clarify the adaptive behavior of smart home systems in runtime. These explanations are customized based on user characteristics and the contextual information derived from the user interactions with the system. Our approach leverages a prompt-based strategy using a fine-tuned large language model, guided by a modular template that integrates key data such as the type of explanation to be generated, user profile, runtime system information, interaction history, and the specific nature of the system adaptation. As a preliminary step, we also present a conceptual model that characterize explanations in the domain of autonomous systems by defining their core concepts. Finally, we evaluate the user experience of the generated explanations through an experiment involving 118 participants. Results show that generated explanations are perceived positive and with high level of acceptance.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3041"},"PeriodicalIF":2.5,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453768/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The DBCV index is more informative than DCSI, CDbw, and VIASCKDE indices for unsupervised clustering internal assessment of concave-shaped and density-based clusters. 对于凹形和基于密度的聚类的无监督聚类内部评估,DBCV指数比DCSI、CDbw和VIASCKDE指数信息更丰富。
IF 2.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-08-29 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.3095
Davide Chicco, Giuseppe Sabino, Luca Oneto, Giuseppe Jurman

Clustering methods are unsupervised machine learning techniques that aggregate data points into specific groups, called clusters, according to specific criteria defined by the clustering algorithm employed. Since clustering methods are unsupervised, no ground truth or gold standard information is available to assess its results, making it challenging to know the results obtained are good or not. In this context, several clustering internal rates are available, like Silhouette coefficient, Calinski-Harabasz index, Davies-Bouldin, Dunn index, Gap statistic, and Shannon entropy, just to mention a few. Even if popular, these clustering internal scores work well only when used to assess convex-shaped and well-separated clusters, but they fail when utilized to evaluate concave-shaped and nested clusters. In these concave-shaped and density-based cases, other coefficients can be informative: Density-Based Clustering Validation Index (DBCVI), Compose Density between and within clusters Index (CDbw), Density Cluster Separability Index (DCSI), Validity Index for Arbitrary-Shaped Clusters based on the kernel density estimation (VIASCKDE). In this study, we describe the DBCV index precisely, and compare its outcomes with the outcomes obtained by CDbw, DCSI, and VIASCKDE on several artificial datasets and on real-world medical datasets derived from electronic health records, produced by density-based clustering methods such as density-based spatial clustering of applications with noise (DBSCAN). To do so, we propose an innovative approach based on clustering result worsening or improving, rather than focusing on searching the "right" number of clusters like many studies do. Moreover, we also recommend open software packages in R and Python for its usage. Our results demonstrate the higher reliability of the DBCV index over CDbw, DCSI, and VIASCKDE when assessing concave-shaped, nested, clustering results.

聚类方法是一种无监督的机器学习技术,它根据所采用的聚类算法定义的特定标准,将数据点聚集到特定的组中,称为聚类。由于聚类方法是无监督的,因此没有可用于评估其结果的基础真理或金标准信息,因此很难知道所获得的结果是好是坏。在这种情况下,可以使用几种内部聚类率,如Silhouette系数、Calinski-Harabasz指数、Davies-Bouldin、Dunn指数、Gap统计和Shannon熵,仅举几例。即使很流行,这些聚类内部分数也只有在用于评估凸形和分离良好的聚类时才有效,但在用于评估凹形和嵌套聚类时就失败了。在这些凹形和基于密度的情况下,其他系数可以提供信息:基于密度的聚类验证指数(DBCVI)、聚类之间和聚类内部的组成密度指数(CDbw)、密度聚类可分离指数(DCSI)、基于核密度估计的任意形状聚类有效性指数(VIASCKDE)。在这项研究中,我们精确地描述了DBCV指数,并将其结果与CDbw、DCSI和VIASCKDE在几个人工数据集和来自电子健康记录的真实医疗数据集上获得的结果进行了比较,这些数据集由基于密度的聚类方法产生,如基于密度的带噪声应用空间聚类(DBSCAN)。为了做到这一点,我们提出了一种基于聚类结果恶化或改善的创新方法,而不是像许多研究那样专注于搜索“正确”的聚类数量。此外,我们还推荐使用R和Python的开放软件包。我们的研究结果表明,在评估凹形、嵌套、聚类结果时,DBCV指数比CDbw、DCSI和VIASCKDE具有更高的可靠性。
{"title":"The DBCV index is more informative than DCSI, CDbw, and VIASCKDE indices for unsupervised clustering internal assessment of concave-shaped and density-based clusters.","authors":"Davide Chicco, Giuseppe Sabino, Luca Oneto, Giuseppe Jurman","doi":"10.7717/peerj-cs.3095","DOIUrl":"10.7717/peerj-cs.3095","url":null,"abstract":"<p><p>Clustering methods are unsupervised machine learning techniques that aggregate data points into specific groups, called <i>clusters</i>, according to specific criteria defined by the clustering algorithm employed. Since clustering methods are unsupervised, no ground truth or gold standard information is available to assess its results, making it challenging to know the results obtained are good or not. In this context, several clustering internal rates are available, like Silhouette coefficient, Calinski-Harabasz index, Davies-Bouldin, Dunn index, Gap statistic, and Shannon entropy, just to mention a few. Even if popular, these clustering internal scores work well only when used to assess convex-shaped and well-separated clusters, but they fail when utilized to evaluate concave-shaped and nested clusters. In these concave-shaped and density-based cases, other coefficients can be informative: Density-Based Clustering Validation Index (DBCVI), Compose Density between and within clusters Index (CDbw), Density Cluster Separability Index (DCSI), Validity Index for Arbitrary-Shaped Clusters based on the kernel density estimation (VIASCKDE). In this study, we describe the DBCV index precisely, and compare its outcomes with the outcomes obtained by CDbw, DCSI, and VIASCKDE on several artificial datasets and on real-world medical datasets derived from electronic health records, produced by density-based clustering methods such as density-based spatial clustering of applications with noise (DBSCAN). To do so, we propose an innovative approach based on clustering result worsening or improving, rather than focusing on searching the \"right\" number of clusters like many studies do. Moreover, we also recommend open software packages in R and Python for its usage. Our results demonstrate the higher reliability of the DBCV index over CDbw, DCSI, and VIASCKDE when assessing concave-shaped, nested, clustering results.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3095"},"PeriodicalIF":2.5,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453699/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delegated multi-party private set intersections from extendable output functions. 可扩展输出函数的委托多方私有集交集。
IF 2.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-08-29 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.3141
Aslı Bay

Operations on sensitive datasets from different parties are essential for various practical applications, such as verifying shopping lists or enforcing no-fly lists. Traditional methods often require one party to access both datasets, which poses privacy concerns. Private set operations provide a solution by enabling these functions without revealing the data involved. However, protocols involving three or more parties are generally much slower than unsecured methods. Outsourced private set operations, where computations are delegated to a non-colluding server, can significantly improve performance, though current protocols have not fully leveraged this assumption. We propose a new protocol that removes the need for public-key cryptography. Our non-interactive set intersection protocol relies solely on the security of an extendable output function, achieving high efficiency. Even in a ten-client setting with 16,384-element sets, the intersection can be computed in under 54 s without communication overhead. Our results indicate that substantial performance improvements can be made without sacrificing privacy, presenting a practical and efficient approach to private set operations.

对来自各方的敏感数据集的操作对于各种实际应用是必不可少的,例如验证购物清单或强制执行禁飞名单。传统的方法通常需要一方访问两个数据集,这带来了隐私问题。私有集合操作提供了一种解决方案,通过启用这些功能而不暴露所涉及的数据。然而,涉及三方或多方的协议通常比不安全的方法慢得多。外包私有集合操作(将计算委托给非串通服务器)可以显著提高性能,尽管目前的协议尚未充分利用这一假设。我们提出了一种新的协议,它消除了对公钥加密的需要。我们的非交互集交集协议仅依赖于可扩展输出函数的安全性,实现了高效率。即使在具有16,384个元素集的10个客户机设置中,交集也可以在54秒内计算出来,而不需要通信开销。我们的结果表明,在不牺牲隐私的情况下,可以取得实质性的性能改进,提出了一种实用而有效的私有集操作方法。
{"title":"Delegated multi-party private set intersections from extendable output functions.","authors":"Aslı Bay","doi":"10.7717/peerj-cs.3141","DOIUrl":"10.7717/peerj-cs.3141","url":null,"abstract":"<p><p>Operations on sensitive datasets from different parties are essential for various practical applications, such as verifying shopping lists or enforcing no-fly lists. Traditional methods often require one party to access both datasets, which poses privacy concerns. Private set operations provide a solution by enabling these functions without revealing the data involved. However, protocols involving three or more parties are generally much slower than unsecured methods. Outsourced private set operations, where computations are delegated to a non-colluding server, can significantly improve performance, though current protocols have not fully leveraged this assumption. We propose a new protocol that removes the need for public-key cryptography. Our non-interactive set intersection protocol relies solely on the security of an extendable output function, achieving high efficiency. Even in a ten-client setting with 16,384-element sets, the intersection can be computed in under 54 s without communication overhead. Our results indicate that substantial performance improvements can be made without sacrificing privacy, presenting a practical and efficient approach to private set operations.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3141"},"PeriodicalIF":2.5,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453744/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DDoS attack detection in Edge-IIoT digital twin environment using deep learning approach. 基于深度学习方法的边缘工业物联网数字孪生环境中的DDoS攻击检测。
IF 2.5 4区 计算机科学 Q2 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-08-29 eCollection Date: 2025-01-01 DOI: 10.7717/peerj-cs.3052
Feras Al-Obeidat, Adnan Amin, Ahmed Shuhaiber, Inam Ul Haq

The industrial Internet of Things (IIoT) and digital twins are redefining how digital models and physical systems interact. IIoT connects physical intelligence, and digital twins virtually represent their physical counterparts. With the rapid growth of Edge-IIoT, it is crucial to create security and privacy regulations to prevent vulnerabilities and threats (i.e., distributed denial of service (DDoS)). DDoS attacks use botnets to overload the target system with requests. In this study, we introduce a novel approach for detecting DDoS attacks in an Edge-IIoT digital twin-based generated dataset. The proposed approach is designed to retain already learned knowledge and easily adapt to new models in a continuous manner without retraining the deep learning model. The target dataset is publicly available and contains 157,600 samples. The proposed models M1, M2, and M3 obtained precision scores of 0.94, 0.93, and 0.93; recall scores of 0.91, 0.97, and 0.99; F1-scores of 0.93, 0.95, and 0.96; and accuracy scores of 0.93, 0.95, and 0.96, respectively. The results demonstrated that transferring previous model knowledge to the next model consistently outperformed baseline approaches.

工业物联网(IIoT)和数字孪生正在重新定义数字模型和物理系统的交互方式。工业物联网连接物理智能,数字双胞胎实际上代表了它们的物理对应物。随着边缘工业物联网的快速发展,创建安全和隐私法规以防止漏洞和威胁(即分布式拒绝服务(DDoS))至关重要。DDoS攻击利用僵尸网络向目标系统发送请求,使其过载。在本研究中,我们介绍了一种在基于边缘工业物联网数字孪生的生成数据集中检测DDoS攻击的新方法。所提出的方法旨在保留已经学习的知识,并以连续的方式轻松适应新模型,而无需重新训练深度学习模型。目标数据集是公开的,包含157,600个样本。提出的模型M1、M2和M3的精度分数分别为0.94、0.93和0.93;回忆分数分别为0.91、0.97和0.99;f1得分分别为0.93、0.95、0.96;准确率分别为0.93、0.95、0.96。结果表明,将以前的模型知识转移到下一个模型始终优于基线方法。
{"title":"DDoS attack detection in Edge-IIoT digital twin environment using deep learning approach.","authors":"Feras Al-Obeidat, Adnan Amin, Ahmed Shuhaiber, Inam Ul Haq","doi":"10.7717/peerj-cs.3052","DOIUrl":"10.7717/peerj-cs.3052","url":null,"abstract":"<p><p>The industrial Internet of Things (IIoT) and digital twins are redefining how digital models and physical systems interact. IIoT connects physical intelligence, and digital twins virtually represent their physical counterparts. With the rapid growth of Edge-IIoT, it is crucial to create security and privacy regulations to prevent vulnerabilities and threats (<i>i.e</i>., distributed denial of service (DDoS)). DDoS attacks use botnets to overload the target system with requests. In this study, we introduce a novel approach for detecting DDoS attacks in an Edge-IIoT digital twin-based generated dataset. The proposed approach is designed to retain already learned knowledge and easily adapt to new models in a continuous manner without retraining the deep learning model. The target dataset is publicly available and contains 157,600 samples. The proposed models M1, M2, and M3 obtained precision scores of 0.94, 0.93, and 0.93; recall scores of 0.91, 0.97, and 0.99; F1-scores of 0.93, 0.95, and 0.96; and accuracy scores of 0.93, 0.95, and 0.96, respectively. The results demonstrated that transferring previous model knowledge to the next model consistently outperformed baseline approaches.</p>","PeriodicalId":54224,"journal":{"name":"PeerJ Computer Science","volume":"11 ","pages":"e3052"},"PeriodicalIF":2.5,"publicationDate":"2025-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12453828/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145132478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
PeerJ Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1