首页 > 最新文献

Network-Computation in Neural Systems最新文献

英文 中文
Sentiment analysis using graph-based Quickprop method for product quality enhancement. 利用基于图的 Quickprop 方法进行情感分析,以提高产品质量。
IF 1.6 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-11-01 Epub Date: 2024-10-14 DOI: 10.1080/0954898X.2024.2410777
Raj Kumar Veerasamy Subramani, Thirumoorthy Kumaresan

The degree to which customers express satisfaction with a product on Twitter and other social media platforms is increasingly used to evaluate product quality. However, the volume and variety of textual data make traditional sentiment analysis methods challenging. The nuanced and context-dependent nature of product-related opinions presents a challenge for existing tools. This research addresses this gap by utilizing complex graph-based modelling strategies to capture the intricacies of real-world data. The Graph-based Quickprop Method constructs a graph model using the Sentiment140 dataset with 1.6 million tweets, where individuals are nodes and interactions are edges. Experimental results show a significant increase in sentiment classification accuracy, demonstrating the method's efficacy. This contribution underscores the importance of relational structures in sentiment analysis and provides a robust framework for extracting actionable insights from user-generated content, leading to improved product quality evaluations. The GQP-PQE method advances sentiment analysis and offers practical implications for businesses seeking to enhance product quality through a better understanding of consumer feedback on social media.

客户在 Twitter 和其他社交媒体平台上对产品表示满意的程度越来越多地被用来评估产品质量。然而,文本数据的数量和多样性使得传统的情感分析方法面临挑战。产品相关意见的细微差别和上下文依赖性给现有工具带来了挑战。本研究利用复杂的基于图的建模策略来捕捉真实世界中错综复杂的数据,从而弥补了这一不足。基于图的 Quickprop 方法利用包含 160 万条推文的 Sentiment140 数据集构建了一个图模型,其中个人是节点,互动是边。实验结果表明,情感分类的准确率显著提高,证明了该方法的有效性。这一贡献强调了情感分析中关系结构的重要性,并为从用户生成的内容中提取可操作的洞察力提供了一个强大的框架,从而改进了产品质量评估。GQP-PQE 方法推动了情感分析的发展,并为企业通过更好地了解消费者在社交媒体上的反馈来提高产品质量提供了实际意义。
{"title":"Sentiment analysis using graph-based Quickprop method for product quality enhancement.","authors":"Raj Kumar Veerasamy Subramani, Thirumoorthy Kumaresan","doi":"10.1080/0954898X.2024.2410777","DOIUrl":"10.1080/0954898X.2024.2410777","url":null,"abstract":"<p><p>The degree to which customers express satisfaction with a product on Twitter and other social media platforms is increasingly used to evaluate product quality. However, the volume and variety of textual data make traditional sentiment analysis methods challenging. The nuanced and context-dependent nature of product-related opinions presents a challenge for existing tools. This research addresses this gap by utilizing complex graph-based modelling strategies to capture the intricacies of real-world data. The Graph-based Quickprop Method constructs a graph model using the Sentiment140 dataset with 1.6 million tweets, where individuals are nodes and interactions are edges. Experimental results show a significant increase in sentiment classification accuracy, demonstrating the method's efficacy. This contribution underscores the importance of relational structures in sentiment analysis and provides a robust framework for extracting actionable insights from user-generated content, leading to improved product quality evaluations. The GQP-PQE method advances sentiment analysis and offers practical implications for businesses seeking to enhance product quality through a better understanding of consumer feedback on social media.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1996-2018"},"PeriodicalIF":1.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142481200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speaker-based language identification for Ethio-Semitic languages using CRNN and hybrid features. 使用 CRNN 和混合特征,基于扬声器识别 Ethio-Semitic 语言。
IF 1.6 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-11-01 Epub Date: 2024-06-04 DOI: 10.1080/0954898X.2024.2359610
Malefia Demilie Melese, Amlakie Aschale Alemu, Ayodeji Olalekan Salau, Ibrahim Gashaw Kasa

Natural language is frequently employed for information exchange between humans and computers in modern digital environments. Natural Language Processing (NLP) is a basic requirement for technological advancement in the field of speech recognition. For additional NLP activities like speech-to-text translation, speech-to-speech translation, speaker recognition, and speech information retrieval, language identification (LID) is a prerequisite. In this paper, we developed a Language Identification (LID) model for Ethio-Semitic languages. We used a hybrid approach (a convolutional recurrent neural network (CRNN)), in addition to a mixed (Mel frequency cepstral coefficient (MFCC) and mel-spectrogram) approach, to build our LID model. The study focused on four Ethio-Semitic languages: Amharic, Ge'ez, Guragigna, and Tigrinya. By using data augmentation for the selected languages, we were able to expand our original dataset of 8 h of audio data to 24 h and 40 min. The proposed selected features, when evaluated, achieved an average performance accuracy of 98.1%, 98.6%, and 99.9% for testing, validation, and training, respectively. The results show that the CRNN model with (Mel-Spectrogram + MFCC) combination feature achieved the best results when compared to other existing models.

在现代数字环境中,人与计算机之间经常使用自然语言进行信息交流。自然语言处理(NLP)是语音识别领域技术进步的基本要求。对于语音到文本翻译、语音到语音翻译、说话人识别和语音信息检索等其他 NLP 活动,语言识别(LID)是先决条件。在本文中,我们为 Ethio-Semitic 语言开发了一个语言识别 (LID) 模型。我们采用了一种混合方法(卷积递归神经网络(CRNN))以及一种混合方法(梅尔频率倒频谱系数(MFCC)和梅尔频谱图)来建立 LID 模型。研究重点是四种民族-闪米特语言:阿姆哈拉语、盖伊兹语、古拉格尼亚语和提格雷尼亚语。通过对所选语言进行数据扩充,我们将原来 8 小时的音频数据集扩充到了 24 小时 40 分钟。在对所选特征进行评估时,建议的测试、验证和训练平均准确率分别达到 98.1%、98.6% 和 99.9%。结果表明,与其他现有模型相比,具有(Mel-Spectrogram + MFCC)组合特征的 CRNN 模型取得了最佳结果。
{"title":"Speaker-based language identification for Ethio-Semitic languages using CRNN and hybrid features.","authors":"Malefia Demilie Melese, Amlakie Aschale Alemu, Ayodeji Olalekan Salau, Ibrahim Gashaw Kasa","doi":"10.1080/0954898X.2024.2359610","DOIUrl":"10.1080/0954898X.2024.2359610","url":null,"abstract":"<p><p>Natural language is frequently employed for information exchange between humans and computers in modern digital environments. Natural Language Processing (NLP) is a basic requirement for technological advancement in the field of speech recognition. For additional NLP activities like speech-to-text translation, speech-to-speech translation, speaker recognition, and speech information retrieval, language identification (LID) is a prerequisite. In this paper, we developed a Language Identification (LID) model for Ethio-Semitic languages. We used a hybrid approach (a convolutional recurrent neural network (CRNN)), in addition to a mixed (Mel frequency cepstral coefficient (MFCC) and mel-spectrogram) approach, to build our LID model. The study focused on four Ethio-Semitic languages: Amharic, Ge'ez, Guragigna, and Tigrinya. By using data augmentation for the selected languages, we were able to expand our original dataset of 8 h of audio data to 24 h and 40 min. The proposed selected features, when evaluated, achieved an average performance accuracy of 98.1%, 98.6%, and 99.9% for testing, validation, and training, respectively. The results show that the CRNN model with (Mel-Spectrogram + MFCC) combination feature achieved the best results when compared to other existing models.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1313-1335"},"PeriodicalIF":1.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141238784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EfficientNet-deep quantum neural network-based economic denial of sustainability attack detection to enhance network security in cloud. 基于 EfficientNet 深度量子神经网络的经济拒绝可持续性攻击检测,以增强云中的网络安全。
IF 1.6 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-11-01 Epub Date: 2024-06-21 DOI: 10.1080/0954898X.2024.2361093
Mariappan Navaneethakrishnan, Maharajan Robinson Joel, Sriram Kalavai Palani, Gandhi Jabakumar Gnanaprakasam

Cloud computing (CC) is a future revolution in the Information technology (IT) and Communication field. Security and internet connectivity are the common major factors to slow down the proliferation of CC. Recently, a new kind of denial of service (DDoS) attacks, known as Economic Denial of Sustainability (EDoS) attack, has been emerging. Though EDoS attacks are smaller at a moment, it can be expected to develop in nearer prospective in tandem with progression in the cloud usage. Here, EfficientNet-B3-Attn-2 fused Deep Quantum Neural Network (EfficientNet-DQNN) is presented for EDoS detection. Initially, cloud is simulated and thereafter, considered input log file is fed to perform data pre-processing. Z-Score Normalization ;(ZSN) is employed to carry out pre-processing of data. Afterwards, feature fusion (FF) is accomplished based on Deep Neural Network (DNN) with Kulczynski similarity. Then, data augmentation (DA) is executed by oversampling based upon Synthetic Minority Over-sampling Technique (SMOTE). At last, attack detection is conducted utilizing EfficientNet-DQNN. Furthermore, EfficientNet-DQNN is formed by incorporation of EfficientNet-B3-Attn-2 with DQNN. In addition, EfficientNet-DQNN attained 89.8% of F1-score, 90.4% of accuracy, 91.1% of precision and 91.2% of recall using BOT-IOT dataset at K-Fold is 9.

云计算(CC)是信息技术(IT)和通信领域未来的一场革命。安全和互联网连接是阻碍云计算普及的主要因素。最近,出现了一种新型的拒绝服务(DDoS)攻击,即经济拒绝可持续发展(EDoS)攻击。虽然目前 EDoS 攻击的规模较小,但随着云计算应用的不断发展,预计在不久的将来这种攻击也会发展起来。在此,介绍了用于 EDoS 检测的 EfficientNet-B3-Attn-2 融合深度量子神经网络(EfficientNet-DQNN)。首先,对云进行模拟,然后输入输入日志文件进行数据预处理。Z-Score Normalization ;(ZSN) 被用来进行数据预处理。然后,基于库尔钦斯基相似性的深度神经网络(DNN)完成特征融合(FF)。然后,通过基于合成少数群体过度采样技术(SMOTE)的过度采样来执行数据增强(DA)。最后,利用 EfficientNet-DQNN 进行攻击检测。此外,EfficientNet-DQNN 由 EfficientNet-B3-Attn-2 和 DQNN 组成。此外,EfficientNet-DQNN 在使用 BOT-IOT 数据集(K-Fold 为 9)时获得了 89.8% 的 F1 分数、90.4% 的准确率、91.1% 的精确率和 91.2% 的召回率。
{"title":"EfficientNet-deep quantum neural network-based economic denial of sustainability attack detection to enhance network security in cloud.","authors":"Mariappan Navaneethakrishnan, Maharajan Robinson Joel, Sriram Kalavai Palani, Gandhi Jabakumar Gnanaprakasam","doi":"10.1080/0954898X.2024.2361093","DOIUrl":"10.1080/0954898X.2024.2361093","url":null,"abstract":"<p><p>Cloud computing (CC) is a future revolution in the Information technology (IT) and Communication field. Security and internet connectivity are the common major factors to slow down the proliferation of CC. Recently, a new kind of denial of service (DDoS) attacks, known as Economic Denial of Sustainability (EDoS) attack, has been emerging. Though EDoS attacks are smaller at a moment, it can be expected to develop in nearer prospective in tandem with progression in the cloud usage. Here, EfficientNet-B3-Attn-2 fused Deep Quantum Neural Network (EfficientNet-DQNN) is presented for EDoS detection. Initially, cloud is simulated and thereafter, considered input log file is fed to perform data pre-processing. Z-Score Normalization ;(ZSN) is employed to carry out pre-processing of data. Afterwards, feature fusion (FF) is accomplished based on Deep Neural Network (DNN) with Kulczynski similarity. Then, data augmentation (DA) is executed by oversampling based upon Synthetic Minority Over-sampling Technique (SMOTE). At last, attack detection is conducted utilizing EfficientNet-DQNN. Furthermore, EfficientNet-DQNN is formed by incorporation of EfficientNet-B3-Attn-2 with DQNN. In addition, EfficientNet-DQNN attained 89.8% of F1-score, 90.4% of accuracy, 91.1% of precision and 91.2% of recall using BOT-IOT dataset at K-Fold is 9.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1360-1384"},"PeriodicalIF":1.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141433400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ContrAttNet: Contribution and attention approach to multivariate time-series data imputation. ContrAttNet:多变量时间序列数据估算的贡献和关注方法。
IF 1.6 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-11-01 Epub Date: 2024-06-03 DOI: 10.1080/0954898X.2024.2360157
Yunfei Yin, Caihao Huang, Xianjian Bao

The imputation of missing values in multivariate time-series data is a basic and popular data processing technology. Recently, some studies have exploited Recurrent Neural Networks (RNNs) and Generative Adversarial Networks (GANs) to impute/fill the missing values in multivariate time-series data. However, when faced with datasets with high missing rates, the imputation error of these methods increases dramatically. To this end, we propose a neural network model based on dynamic contribution and attention, denoted as ContrAttNet. ContrAttNet consists of three novel modules: feature attention module, iLSTM (imputation Long Short-Term Memory) module, and 1D-CNN (1-Dimensional Convolutional Neural Network) module. ContrAttNet exploits temporal information and spatial feature information to predict missing values, where iLSTM attenuates the memory of LSTM according to the characteristics of the missing values, to learn the contributions of different features. Moreover, the feature attention module introduces an attention mechanism based on contributions, to calculate supervised weights. Furthermore, under the influence of these supervised weights, 1D-CNN processes the time-series data by treating them as spatial features. Experimental results show that ContrAttNet outperforms other state-of-the-art models in the missing value imputation of multivariate time-series data, with average 6% MAPE and 9% MAE on the benchmark datasets.

多元时间序列数据中缺失值的估算是一项基本且流行的数据处理技术。最近,一些研究利用循环神经网络(RNN)和生成对抗网络(GAN)来估算/填补多元时间序列数据中的缺失值。然而,当面对高缺失率的数据集时,这些方法的估算误差会急剧增加。为此,我们提出了一种基于动态贡献和注意力的神经网络模型,称为 ContrAttNet。ContrAttNet 由三个新模块组成:特征注意模块、iLSTM(估算长短期记忆)模块和 1D-CNN(一维卷积神经网络)模块。ContrAttNet 利用时间信息和空间特征信息预测缺失值,而 iLSTM 则根据缺失值的特征减弱 LSTM 的记忆,以学习不同特征的贡献。此外,特征关注模块引入了基于贡献的关注机制,以计算监督权重。此外,在这些监督权重的影响下,1D-CNN 将时间序列数据视为空间特征进行处理。实验结果表明,ContrAttNet 在多变量时间序列数据的缺失值估算方面优于其他最先进的模型,在基准数据集上的平均 MAPE 为 6%,MAE 为 9%。
{"title":"ContrAttNet: Contribution and attention approach to multivariate time-series data imputation.","authors":"Yunfei Yin, Caihao Huang, Xianjian Bao","doi":"10.1080/0954898X.2024.2360157","DOIUrl":"10.1080/0954898X.2024.2360157","url":null,"abstract":"<p><p>The imputation of missing values in multivariate time-series data is a basic and popular data processing technology. Recently, some studies have exploited Recurrent Neural Networks (RNNs) and Generative Adversarial Networks (GANs) to impute/fill the missing values in multivariate time-series data. However, when faced with datasets with high missing rates, the imputation error of these methods increases dramatically. To this end, we propose a neural network model based on dynamic contribution and attention, denoted as <b>ContrAttNet</b>. <b>ContrAttNet</b> consists of three novel modules: feature attention module, iLSTM (imputation Long Short-Term Memory) module, and 1D-CNN (1-Dimensional Convolutional Neural Network) module. <b>ContrAttNet</b> exploits temporal information and spatial feature information to predict missing values, where iLSTM attenuates the memory of LSTM according to the characteristics of the missing values, to learn the contributions of different features. Moreover, the feature attention module introduces an attention mechanism based on contributions, to calculate supervised weights. Furthermore, under the influence of these supervised weights, 1D-CNN processes the time-series data by treating them as spatial features. Experimental results show that <b>ContrAttNet</b> outperforms other state-of-the-art models in the missing value imputation of multivariate time-series data, with average 6% MAPE and 9% MAE on the benchmark datasets.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1336-1359"},"PeriodicalIF":1.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141201474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can human brain connectivity explain verbal working memory? 人脑连通性能否解释言语工作记忆?
IF 1.6 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-11-01 Epub Date: 2024-11-12 DOI: 10.1080/0954898X.2024.2421196
Maxime Carriere, Rosario Tomasello, Friedemann Pulvermüller

The ability of humans to store spoken words in verbal working memory and build extensive vocabularies is believed to stem from evolutionary changes in cortical connectivity across primate species. However, the underlying neurobiological mechanisms remain unclear. Why can humans acquire vast vocabularies, while non-human primates cannot? This study addresses this question using brain-constrained neural networks that realize between-species differences in cortical connectivity. It investigates how these structural differences support the formation of neural representations for spoken words and the emergence of verbal working memory, crucial for human vocabulary building. We develop comparative models of frontotemporal and occipital cortices, reflecting human and non-human primate neuroanatomy. Using meanfield and spiking neural networks, we simulate auditory word recognition and examine verbal working memory function. The "human models", characterized by denser inter-area connectivity in core language areas, produced larger cell assemblies than the "monkey models", with specific topographies reflecting semantic properties of the represented words. Crucially, longer-lasting reverberant neural activity was observed in human versus monkey architectures, compatible with robust verbal working memory, a necessary condition for vocabulary building. Our findings offer insights into the structural basis of human-specific symbol learning and verbal working memory, shedding light on humans' unique capacity for large vocabulary acquisition.

人类能够在言语工作记忆中存储口语词汇并建立广泛的词汇量,这被认为源于灵长类动物大脑皮层连接性的进化变化。然而,其潜在的神经生物学机制仍不清楚。为什么人类可以获得大量词汇,而非人灵长类动物却不能?这项研究利用大脑约束神经网络来解决这个问题,该网络实现了大脑皮层连通性的物种间差异。它研究了这些结构性差异如何支持口语词汇神经表征的形成以及对人类词汇积累至关重要的言语工作记忆的出现。我们建立了额颞叶和枕叶皮层的比较模型,反映了人类和非人灵长类的神经解剖学。利用均值场和尖峰神经网络,我们模拟了听觉单词识别并研究了言语工作记忆功能。与 "猴子模型 "相比,"人类模型 "以核心语言区更密集的区间连接为特征,产生了更大的细胞集合,其特定拓扑反映了所代表单词的语义属性。最重要的是,在人类与猴子的结构中观察到了持续时间更长的混响神经活动,这与强大的语言工作记忆相一致,而语言工作记忆是词汇构建的必要条件。我们的研究结果为人类特有的符号学习和言语工作记忆的结构基础提供了见解,揭示了人类获取大量词汇的独特能力。
{"title":"Can human brain connectivity explain verbal working memory?","authors":"Maxime Carriere, Rosario Tomasello, Friedemann Pulvermüller","doi":"10.1080/0954898X.2024.2421196","DOIUrl":"10.1080/0954898X.2024.2421196","url":null,"abstract":"<p><p>The ability of humans to store spoken words in verbal working memory and build extensive vocabularies is believed to stem from evolutionary changes in cortical connectivity across primate species. However, the underlying neurobiological mechanisms remain unclear. Why can humans acquire vast vocabularies, while non-human primates cannot? This study addresses this question using brain-constrained neural networks that realize between-species differences in cortical connectivity. It investigates how these structural differences support the formation of neural representations for spoken words and the emergence of verbal working memory, crucial for human vocabulary building. We develop comparative models of frontotemporal and occipital cortices, reflecting human and non-human primate neuroanatomy. Using meanfield and spiking neural networks, we simulate auditory word recognition and examine verbal working memory function. The \"human models\", characterized by denser inter-area connectivity in core language areas, produced larger cell assemblies than the \"monkey models\", with specific topographies reflecting semantic properties of the represented words. Crucially, longer-lasting reverberant neural activity was observed in human versus monkey architectures, compatible with robust verbal working memory, a necessary condition for vocabulary building. Our findings offer insights into the structural basis of human-specific symbol learning and verbal working memory, shedding light on humans' unique capacity for large vocabulary acquisition.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"2106-2147"},"PeriodicalIF":1.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142632807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things and Cloud Computing-based Disease Diagnosis using Optimized Improved Generative Adversarial Network in Smart Healthcare System. 基于物联网和云计算的疾病诊断,在智能医疗系统中使用优化改进的生成对抗网络。
IF 1.6 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-11-01 Epub Date: 2024-10-13 DOI: 10.1080/0954898X.2024.2392770
Thimmakkondu Babuji Sivakumar, Shahul Hameed Hasan Hussain, R Balamanigandan

The integration of IoT and cloud services enhances communication and quality of life, while predictive analytics powered by AI and deep learning enables proactive healthcare. Deep learning, a subset of machine learning, efficiently analyzes vast datasets, offering rapid disease prediction. Leveraging recurrent neural networks on electronic health records improves accuracy for timely intervention and preventative care. In this manuscript, Internet of Things and Cloud Computing-based Disease Diagnosis using Optimized Improved Generative Adversarial Network in Smart Healthcare System (IOT-CC-DD-OICAN-SHS) is proposed. Initially, an Internet of Things (IoT) device collects diabetes, chronic kidney disease, and heart disease data from patients via wearable devices and intelligent sensors and then saves the patient's large data in the cloud. These cloud data are pre-processed to turn them into a suitable format. The pre-processed dataset is sent into the Improved Generative Adversarial Network (IGAN), which reliably classifies the data as disease-free or diseased. Then, IGAN was optimized using the Flamingo Search optimization algorithm (FSOA). The proposed technique is implemented in Java using Cloud Sim and examined utilizing several performance metrics. The proposed method attains greater accuracy and specificity with lower execution time compared to existing methodologies, IoT-C-SHMS-HDP-DL, PPEDL-MDTC and CSO-CLSTM-DD-SHS respectively.

物联网和云服务的整合提高了通信和生活质量,而由人工智能和深度学习驱动的预测分析则实现了积极主动的医疗保健。深度学习是机器学习的一个子集,它能有效地分析庞大的数据集,提供快速的疾病预测。利用电子健康记录中的递归神经网络,可提高及时干预和预防保健的准确性。本文提出了基于物联网和云计算的疾病诊断方法,即在智能医疗系统中使用优化改进生成对抗网络(IOT-CC-DD-OICAN-SHS)。最初,物联网(IoT)设备通过可穿戴设备和智能传感器收集患者的糖尿病、慢性肾病和心脏病数据,然后将患者的大数据保存在云端。这些云数据经过预处理,变成合适的格式。预处理后的数据集被送入改进生成对抗网络(IGAN),该网络能可靠地将数据分类为无病或有病。然后,使用火烈鸟搜索优化算法(FSOA)对 IGAN 进行优化。提出的技术使用云 Sim 在 Java 中实现,并利用多个性能指标进行检验。与现有方法(分别为 IoT-C-SHMS-HDP-DL、PPEDL-MDTC 和 CSO-CLSTM-DD-SHS)相比,所提出的方法以更短的执行时间获得了更高的准确性和特异性。
{"title":"Internet of Things and Cloud Computing-based Disease Diagnosis using Optimized Improved Generative Adversarial Network in Smart Healthcare System.","authors":"Thimmakkondu Babuji Sivakumar, Shahul Hameed Hasan Hussain, R Balamanigandan","doi":"10.1080/0954898X.2024.2392770","DOIUrl":"10.1080/0954898X.2024.2392770","url":null,"abstract":"<p><p>The integration of IoT and cloud services enhances communication and quality of life, while predictive analytics powered by AI and deep learning enables proactive healthcare. Deep learning, a subset of machine learning, efficiently analyzes vast datasets, offering rapid disease prediction. Leveraging recurrent neural networks on electronic health records improves accuracy for timely intervention and preventative care. In this manuscript, Internet of Things and Cloud Computing-based Disease Diagnosis using Optimized Improved Generative Adversarial Network in Smart Healthcare System (IOT-CC-DD-OICAN-SHS) is proposed. Initially, an Internet of Things (IoT) device collects diabetes, chronic kidney disease, and heart disease data from patients via wearable devices and intelligent sensors and then saves the patient's large data in the cloud. These cloud data are pre-processed to turn them into a suitable format. The pre-processed dataset is sent into the Improved Generative Adversarial Network (IGAN), which reliably classifies the data as disease-free or diseased. Then, IGAN was optimized using the Flamingo Search optimization algorithm (FSOA). The proposed technique is implemented in Java using Cloud Sim and examined utilizing several performance metrics. The proposed method attains greater accuracy and specificity with lower execution time compared to existing methodologies, IoT-C-SHMS-HDP-DL, PPEDL-MDTC and CSO-CLSTM-DD-SHS respectively.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1752-1775"},"PeriodicalIF":1.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142481198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-level authentication for security in cloud using improved quantum key distribution. 利用改进的量子密钥分配实现云安全的多级认证。
IF 1.6 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-11-01 Epub Date: 2024-07-08 DOI: 10.1080/0954898X.2024.2367480
Ashutosh Kumar, Garima Verma

Cloud computing is an on-demand virtual-based technology to develop, configure, and modify applications online through the internet. It enables the users to handle various operations such as storage, back-up, and recovery of data, data analysis, delivery of software applications, implementation of new services and applications, hosting websites and blogs, and streaming of audio and video files. Thereby, it provides us many benefits although it is backlashed due to problems related to cloud security like data leakage, data loss, cyber attacks, etc. To address the security concerns, researchers have developed a variety of authentication mechanisms. This means that the authentication procedure used in the suggested method is multi-levelled. As a result, a better QKD method is offered to strengthen cloud security against different types of security risks. Key generation for enhanced QKD is based on the ABE public key cryptography approach. Here, an approach named CPABE is used in improved QKD. The Improved QKD scored the reduced KCA attack ratings of 0.3193, this is superior to CMMLA (0.7915), CPABE (0.8916), AES (0.5277), Blowfish (0.6144), and ECC (0.4287), accordingly. Finally, this multi-level authentication using an improved QKD approach is analysed under various measures and validates the enhancement over the state-of-the-art models.

云计算是一种通过互联网在线开发、配置和修改应用程序的按需虚拟技术。它使用户能够处理各种操作,如数据的存储、备份和恢复、数据分析、软件应用程序的交付、新服务和应用程序的实施、网站和博客的托管以及音频和视频文件的流式传输。因此,云计算为我们带来了许多好处,尽管由于数据泄露、数据丢失、网络攻击等与云计算安全相关的问题,云计算也受到了质疑。为了解决安全问题,研究人员开发了各种认证机制。这意味着建议方法中使用的认证程序是多层次的。因此,我们提供了一种更好的 QKD 方法,以加强云安全,抵御不同类型的安全风险。增强型 QKD 的密钥生成基于 ABE 公钥加密方法。这里,一种名为 CPABE 的方法被用于改进型 QKD。改进型 QKD 的 KCA 攻击评分为 0.3193,优于 CMMLA (0.7915)、CPABE (0.8916)、AES (0.5277)、Blowfish (0.6144) 和 ECC (0.4287)。最后,使用改进的 QKD 方法对这种多层次身份验证进行了各种分析,并验证了与最先进的模型相比所取得的进步。
{"title":"Multi-level authentication for security in cloud using improved quantum key distribution.","authors":"Ashutosh Kumar, Garima Verma","doi":"10.1080/0954898X.2024.2367480","DOIUrl":"10.1080/0954898X.2024.2367480","url":null,"abstract":"<p><p>Cloud computing is an on-demand virtual-based technology to develop, configure, and modify applications online through the internet. It enables the users to handle various operations such as storage, back-up, and recovery of data, data analysis, delivery of software applications, implementation of new services and applications, hosting websites and blogs, and streaming of audio and video files. Thereby, it provides us many benefits although it is backlashed due to problems related to cloud security like data leakage, data loss, cyber attacks, etc. To address the security concerns, researchers have developed a variety of authentication mechanisms. This means that the authentication procedure used in the suggested method is multi-levelled. As a result, a better QKD method is offered to strengthen cloud security against different types of security risks. Key generation for enhanced QKD is based on the ABE public key cryptography approach. Here, an approach named CPABE is used in improved QKD. The Improved QKD scored the reduced KCA attack ratings of 0.3193, this is superior to CMMLA (0.7915), CPABE (0.8916), AES (0.5277), Blowfish (0.6144), and ECC (0.4287), accordingly. Finally, this multi-level authentication using an improved QKD approach is analysed under various measures and validates the enhancement over the state-of-the-art models.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1443-1463"},"PeriodicalIF":1.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141555959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EGDP based feature extraction and deep convolutional belief network for brain tumor detection using MRI image. 基于 EGDP 特征提取和深度卷积信念网络的磁共振成像脑肿瘤检测。
IF 1.6 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-11-01 Epub Date: 2024-09-16 DOI: 10.1080/0954898X.2024.2389248
Loganayagi T, Pooja Panapana, Ganji Ramanjaiah, Smritilekha Das

This research presents a novel deep learning framework for MRI-based brain tumour (BT) detection. The input brain MRI image is first acquired from the dataset. Once the images have been obtained, they are passed to an image preprocessing step where a median filter is used to eliminate noise and artefacts from the input image. The tumour-tumour region segmentation module receives the denoised image and it uses RP-Net to segment the BT region. Following that, in order to prevent overfitting, image augmentation is carried out utilizing methods including rotating, flipping, shifting, and colour augmentation. Later, the augmented image is forwarded to the feature extraction phase, wherein features like GLCM and proposed EGDP formulated by including entropy with GDP are extracted. Finally, based on the extracted features, BT detection is accomplished based on the proposed deep convolutional belief network (DCvB-Net), which is formulated using the deep convolutional neural network and deep belief network.The devised DCvB-Net for BT detection is investigated for its performance concerning true negative rate, accuracy, and true positive rate is established to have acquired values of 93%, 92.3%, and 93.1% correspondingly.

本研究提出了一种新型深度学习框架,用于基于核磁共振成像的脑肿瘤(BT)检测。首先从数据集中获取输入的脑部 MRI 图像。获得图像后,将其传递到图像预处理步骤,在该步骤中使用中值滤波器消除输入图像中的噪声和伪影。肿瘤区域分割模块接收去噪图像,并使用 RP-Net 对 BT 区域进行分割。随后,为了防止过度拟合,利用旋转、翻转、移位和颜色增强等方法对图像进行增强。随后,增强后的图像被转到特征提取阶段,提取 GLCM 和建议的 EGDP 等特征,EGDP 由熵和 GDP 组成。最后,根据所提取的特征,基于所提出的深度卷积信念网络(DCvB-Net)完成 BT 检测,该网络是利用深度卷积神经网络和深度信念网络构建而成。
{"title":"EGDP based feature extraction and deep convolutional belief network for brain tumor detection using MRI image.","authors":"Loganayagi T, Pooja Panapana, Ganji Ramanjaiah, Smritilekha Das","doi":"10.1080/0954898X.2024.2389248","DOIUrl":"10.1080/0954898X.2024.2389248","url":null,"abstract":"<p><p>This research presents a novel deep learning framework for MRI-based brain tumour (BT) detection. The input brain MRI image is first acquired from the dataset. Once the images have been obtained, they are passed to an image preprocessing step where a median filter is used to eliminate noise and artefacts from the input image. The tumour-tumour region segmentation module receives the denoised image and it uses RP-Net to segment the BT region. Following that, in order to prevent overfitting, image augmentation is carried out utilizing methods including rotating, flipping, shifting, and colour augmentation. Later, the augmented image is forwarded to the feature extraction phase, wherein features like GLCM and proposed EGDP formulated by including entropy with GDP are extracted. Finally, based on the extracted features, BT detection is accomplished based on the proposed deep convolutional belief network (DCvB-Net), which is formulated using the deep convolutional neural network and deep belief network.The devised DCvB-Net for BT detection is investigated for its performance concerning true negative rate, accuracy, and true positive rate is established to have acquired values of 93%, 92.3%, and 93.1% correspondingly.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1721-1751"},"PeriodicalIF":1.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142301213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized memory augmented graph neural network-based DoS attacks detection in wireless sensor network. 基于优化内存增强图神经网络的无线传感器网络 DoS 攻击检测。
IF 1.6 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-11-01 Epub Date: 2024-10-28 DOI: 10.1080/0954898X.2024.2392786
Ayyasamy Pushpalatha, Sunkari Pradeep, Matta Venkata Pullarao, Shanmuganathan Sankar

Wireless Sensor Networks (WSNs) are mainly used for data monitoring and collection purposes. Usually, they are made up of numerous sensor nodes that are utilized to gather data remotely. Each sensor node is small and inexpensive. Due to the increasing intelligence, frequency, and complexity of these malicious attacks, traditional attack detection is less effective. In this manuscript, Optimized Memory Augmented Graph Neural Network-based DoS Attacks Detection in Wireless Sensor Network (DoS-AD-MAGNN-WSN) is proposed. Here, the input data is amassed from WSN-DS dataset. The input data is pre-processing by secure adaptive event-triggered filter for handling negation and stemming. Then, the output is fed to nested patch-based feature extraction to extract the optimal features. The extracted features are given to MAGNN for the effective classification of blackhole, flooding, grayhole, scheduling, and normal. The weight parameter of MAGNN is optimized by gradient-based optimizers for better accuracy. The proposed method is activated in Python, and it attains 31.20%, 23.30%, and 26.43% higher accuracy analyzed with existing techniques, such as CNN-LSTM-based method for Denial of Service attacks detection in WSNs (CNN-DoS-AD-WSN), Trust-based DoS attack detection in WSNs for reliable data transmission (TB-DoS-AD-WSN-RDT), and FBDR-Fuzzy-based DoS attack detection with recovery mechanism for WSNs (FBDR-DoS-AD-RM-WSN), respectively.

无线传感器网络(WSN)主要用于监测和收集数据。通常,它们由许多传感器节点组成,用于远程收集数据。每个传感器节点体积小、成本低。由于这些恶意攻击的智能性、频率和复杂性不断提高,传统的攻击检测方法已不再有效。本文提出了基于优化内存增强图神经网络的无线传感器网络 DoS 攻击检测(DoS-AD-MAGNN-WSN)。输入数据来自 WSN-DS 数据集。输入数据通过安全自适应事件触发滤波器进行预处理,以处理否定和词干。然后,将输出输入基于嵌套补丁的特征提取,以提取最佳特征。提取的特征将交给 MAGNN,以便对黑洞、洪水、灰洞、调度和正常进行有效分类。MAGNN 的权重参数通过基于梯度的优化器进行优化,以提高准确性。提出的方法在 Python 中被激活,与基于 CNN-LSTM 的 WSN 中拒绝服务攻击检测方法(CNN-DoS-AD-WSN)、基于信任的 WSN 中 DoS 攻击检测方法(TB-DoS-AD-WSN-RDT)和基于 FBDR-Fuzzy 的 WSN DoS 攻击检测与恢复机制(FBDR-DoS-AD-RM-WSN)等现有技术相比,准确率分别提高了 31.20%、23.30% 和 26.43%。
{"title":"Optimized memory augmented graph neural network-based DoS attacks detection in wireless sensor network.","authors":"Ayyasamy Pushpalatha, Sunkari Pradeep, Matta Venkata Pullarao, Shanmuganathan Sankar","doi":"10.1080/0954898X.2024.2392786","DOIUrl":"10.1080/0954898X.2024.2392786","url":null,"abstract":"<p><p>Wireless Sensor Networks (WSNs) are mainly used for data monitoring and collection purposes. Usually, they are made up of numerous sensor nodes that are utilized to gather data remotely. Each sensor node is small and inexpensive. Due to the increasing intelligence, frequency, and complexity of these malicious attacks, traditional attack detection is less effective. In this manuscript, Optimized Memory Augmented Graph Neural Network-based DoS Attacks Detection in Wireless Sensor Network (DoS-AD-MAGNN-WSN) is proposed. Here, the input data is amassed from WSN-DS dataset. The input data is pre-processing by secure adaptive event-triggered filter for handling negation and stemming. Then, the output is fed to nested patch-based feature extraction to extract the optimal features. The extracted features are given to MAGNN for the effective classification of blackhole, flooding, grayhole, scheduling, and normal. The weight parameter of MAGNN is optimized by gradient-based optimizers for better accuracy. The proposed method is activated in Python, and it attains 31.20%, 23.30%, and 26.43% higher accuracy analyzed with existing techniques, such as CNN-LSTM-based method for Denial of Service attacks detection in WSNs (CNN-DoS-AD-WSN), Trust-based DoS attack detection in WSNs for reliable data transmission (TB-DoS-AD-WSN-RDT), and FBDR-Fuzzy-based DoS attack detection with recovery mechanism for WSNs (FBDR-DoS-AD-RM-WSN), respectively.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1810-1836"},"PeriodicalIF":1.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142513157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing an optimal task scheduling and VM placement in the cloud environment with multi-objective constraints using Hybrid Lemurs and Gannet Optimization Algorithm. 使用混合 Lemurs 和 Gannet 优化算法,在多目标约束条件下设计云环境中的最佳任务调度和虚拟机放置。
IF 1.6 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2025-11-01 Epub Date: 2024-10-09 DOI: 10.1080/0954898X.2024.2412678
Kapil Vhatkar, Atul Baliram Kathole, Savita Lonare, Jayashree Katti, Vinod Vijaykumar Kimbahune

An efficient resource utilization method can greatly reduce expenses and unwanted resources. Typical cloud resource planning approaches lack support for the emerging paradigm regarding asset management speed and optimization. The use of cloud computing relies heavily on task planning and allocation of resources. The task scheduling issue is more crucial in arranging and allotting application jobs supplied by customers on Virtual Machines (VM) in a specific manner. The task planning issue needs to be specifically stated to increase scheduling efficiency. The task scheduling in the cloud environment model is developed using optimization techniques. This model intends to optimize both the task scheduling and VM placement over the cloud environment. In this model, a new hybrid-meta-heuristic optimization algorithm is developed named the Hybrid Lemurs-based Gannet Optimization Algorithm (HL-GOA). The multi-objective function is considered with constraints like cost, time, resource utilization, makespan, and throughput. The proposed model is further validated and compared against existing methodologies. The total time required for scheduling and VM placement is 30.23%, 6.25%, 11.76%, and 10.44% reduced than ESO, RSO, LO, and GOA with 2 VMs. The simulation outcomes revealed that the developed model effectively resolved the scheduling and VL placement issues.

高效的资源利用方法可以大大减少开支和不必要的资源。典型的云资源规划方法缺乏对新兴资产管理速度和优化模式的支持。云计算的使用在很大程度上依赖于任务规划和资源分配。任务调度问题在以特定方式在虚拟机(VM)上安排和分配客户提供的应用任务时更为关键。为了提高调度效率,需要具体说明任务规划问题。云环境中的任务调度模型是利用优化技术开发的。该模型旨在优化云环境中的任务调度和虚拟机放置。在该模型中,开发了一种新的混合元启发式优化算法,名为基于狐猴的混合甘网优化算法(HL-GOA)。多目标函数考虑了成本、时间、资源利用率、工期和吞吐量等约束条件。提出的模型得到了进一步验证,并与现有方法进行了比较。与使用 2 个虚拟机的 ESO、RSO、LO 和 GOA 相比,调度和虚拟机放置所需的总时间分别减少了 30.23%、6.25%、11.76% 和 10.44%。仿真结果表明,开发的模型有效地解决了调度和虚拟机放置问题。
{"title":"Designing an optimal task scheduling and VM placement in the cloud environment with multi-objective constraints using Hybrid Lemurs and Gannet Optimization Algorithm.","authors":"Kapil Vhatkar, Atul Baliram Kathole, Savita Lonare, Jayashree Katti, Vinod Vijaykumar Kimbahune","doi":"10.1080/0954898X.2024.2412678","DOIUrl":"10.1080/0954898X.2024.2412678","url":null,"abstract":"<p><p>An efficient resource utilization method can greatly reduce expenses and unwanted resources. Typical cloud resource planning approaches lack support for the emerging paradigm regarding asset management speed and optimization. The use of cloud computing relies heavily on task planning and allocation of resources. The task scheduling issue is more crucial in arranging and allotting application jobs supplied by customers on Virtual Machines (VM) in a specific manner. The task planning issue needs to be specifically stated to increase scheduling efficiency. The task scheduling in the cloud environment model is developed using optimization techniques. This model intends to optimize both the task scheduling and VM placement over the cloud environment. In this model, a new hybrid-meta-heuristic optimization algorithm is developed named the Hybrid Lemurs-based Gannet Optimization Algorithm (HL-GOA). The multi-objective function is considered with constraints like cost, time, resource utilization, makespan, and throughput. The proposed model is further validated and compared against existing methodologies. The total time required for scheduling and VM placement is 30.23%, 6.25%, 11.76%, and 10.44% reduced than ESO, RSO, LO, and GOA with 2 VMs. The simulation outcomes revealed that the developed model effectively resolved the scheduling and VL placement issues.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"2075-2105"},"PeriodicalIF":1.6,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142395378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network-Computation in Neural Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1