首页 > 最新文献

Network-Computation in Neural Systems最新文献

英文 中文
Performance analyses of weighted superposition attraction-repulsion algorithms in solving difficult optimization problems. 加权叠加吸引-排斥算法在解决困难优化问题中的性能分析。
IF 1.1 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-24 DOI: 10.1080/0954898X.2024.2367481
Adil Baykasoğlu

The purpose of this paper is to test the performance of the recently proposed weighted superposition attraction-repulsion algorithms (WSA and WSAR) on unconstrained continuous optimization test problems and constrained optimization problems. WSAR is a successor of weighted superposition attraction algorithm (WSA). WSAR is established upon the superposition principle from physics and mimics attractive and repulsive movements of solution agents (vectors). Differently from the WSA, WSAR also considers repulsive movements with updated solution move equations. WSAR requires very few algorithm-specific parameters to be set and has good convergence and searching capability. Through extensive computational tests on many benchmark problems including CEC'2015 and CEC'2020 performance of the WSAR is compared against WSA and other metaheuristic algorithms. It is statistically shown that the WSAR algorithm is able to produce good and competitive results in comparison to its predecessor WSA and other metaheuristic algorithms.

本文旨在测试最近提出的加权叠加吸引-排斥算法(WSA 和 WSAR)在无约束连续优化测试问题和约束优化问题上的性能。WSAR 是加权叠加吸引算法(WSA)的后续算法。WSAR 基于物理学中的叠加原理,模仿解代理(向量)的吸引和排斥运动。与 WSA 不同的是,WSAR 还通过更新解移动方程来考虑排斥运动。WSAR 只需设置很少的特定算法参数,并具有良好的收敛性和搜索能力。通过对包括 CEC'2015 和 CEC'2020 在内的许多基准问题进行广泛的计算测试,WSAR 的性能与 WSA 和其他元启发式算法进行了比较。统计结果表明,WSAR 算法与其前身 WSA 和其他元启发式算法相比,能够产生良好且有竞争力的结果。
{"title":"Performance analyses of weighted superposition attraction-repulsion algorithms in solving difficult optimization problems.","authors":"Adil Baykasoğlu","doi":"10.1080/0954898X.2024.2367481","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2367481","url":null,"abstract":"<p><p>The purpose of this paper is to test the performance of the recently proposed weighted superposition attraction-repulsion algorithms (WSA and WSAR) on unconstrained continuous optimization test problems and constrained optimization problems. WSAR is a successor of weighted superposition attraction algorithm (WSA). WSAR is established upon the superposition principle from physics and mimics attractive and repulsive movements of solution agents (vectors). Differently from the WSA, WSAR also considers repulsive movements with updated solution move equations. WSAR requires very few algorithm-specific parameters to be set and has good convergence and searching capability. Through extensive computational tests on many benchmark problems including CEC'2015 and CEC'2020 performance of the WSAR is compared against WSA and other metaheuristic algorithms. It is statistically shown that the WSAR algorithm is able to produce good and competitive results in comparison to its predecessor WSA and other metaheuristic algorithms.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-57"},"PeriodicalIF":1.1,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141447639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EfficientNet-deep quantum neural network-based economic denial of sustainability attack detection to enhance network security in cloud. 基于 EfficientNet 深度量子神经网络的经济拒绝可持续性攻击检测,以增强云中的网络安全。
IF 1.1 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-21 DOI: 10.1080/0954898X.2024.2361093
Mariappan Navaneethakrishnan, Maharajan Robinson Joel, Sriram Kalavai Palani, Gandhi Jabakumar Gnanaprakasam

Cloud computing (CC) is a future revolution in the Information technology (IT) and Communication field. Security and internet connectivity are the common major factors to slow down the proliferation of CC. Recently, a new kind of denial of service (DDoS) attacks, known as Economic Denial of Sustainability (EDoS) attack, has been emerging. Though EDoS attacks are smaller at a moment, it can be expected to develop in nearer prospective in tandem with progression in the cloud usage. Here, EfficientNet-B3-Attn-2 fused Deep Quantum Neural Network (EfficientNet-DQNN) is presented for EDoS detection. Initially, cloud is simulated and thereafter, considered input log file is fed to perform data pre-processing. Z-Score Normalization ;(ZSN) is employed to carry out pre-processing of data. Afterwards, feature fusion (FF) is accomplished based on Deep Neural Network (DNN) with Kulczynski similarity. Then, data augmentation (DA) is executed by oversampling based upon Synthetic Minority Over-sampling Technique (SMOTE). At last, attack detection is conducted utilizing EfficientNet-DQNN. Furthermore, EfficientNet-DQNN is formed by incorporation of EfficientNet-B3-Attn-2 with DQNN. In addition, EfficientNet-DQNN attained 89.8% of F1-score, 90.4% of accuracy, 91.1% of precision and 91.2% of recall using BOT-IOT dataset at K-Fold is 9.

云计算(CC)是信息技术(IT)和通信领域未来的一场革命。安全和互联网连接是阻碍云计算普及的主要因素。最近,出现了一种新型的拒绝服务(DDoS)攻击,即经济拒绝可持续发展(EDoS)攻击。虽然目前 EDoS 攻击的规模较小,但随着云计算应用的不断发展,预计在不久的将来这种攻击也会发展起来。在此,介绍了用于 EDoS 检测的 EfficientNet-B3-Attn-2 融合深度量子神经网络(EfficientNet-DQNN)。首先,对云进行模拟,然后输入输入日志文件进行数据预处理。Z-Score Normalization ;(ZSN) 被用来进行数据预处理。然后,基于库尔钦斯基相似性的深度神经网络(DNN)完成特征融合(FF)。然后,通过基于合成少数群体过度采样技术(SMOTE)的过度采样来执行数据增强(DA)。最后,利用 EfficientNet-DQNN 进行攻击检测。此外,EfficientNet-DQNN 由 EfficientNet-B3-Attn-2 和 DQNN 组成。此外,EfficientNet-DQNN 在使用 BOT-IOT 数据集(K-Fold 为 9)时获得了 89.8% 的 F1 分数、90.4% 的准确率、91.1% 的精确率和 91.2% 的召回率。
{"title":"EfficientNet-deep quantum neural network-based economic denial of sustainability attack detection to enhance network security in cloud.","authors":"Mariappan Navaneethakrishnan, Maharajan Robinson Joel, Sriram Kalavai Palani, Gandhi Jabakumar Gnanaprakasam","doi":"10.1080/0954898X.2024.2361093","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2361093","url":null,"abstract":"<p><p>Cloud computing (CC) is a future revolution in the Information technology (IT) and Communication field. Security and internet connectivity are the common major factors to slow down the proliferation of CC. Recently, a new kind of denial of service (DDoS) attacks, known as Economic Denial of Sustainability (EDoS) attack, has been emerging. Though EDoS attacks are smaller at a moment, it can be expected to develop in nearer prospective in tandem with progression in the cloud usage. Here, EfficientNet-B3-Attn-2 fused Deep Quantum Neural Network (EfficientNet-DQNN) is presented for EDoS detection. Initially, cloud is simulated and thereafter, considered input log file is fed to perform data pre-processing. Z-Score Normalization ;(ZSN) is employed to carry out pre-processing of data. Afterwards, feature fusion (FF) is accomplished based on Deep Neural Network (DNN) with Kulczynski similarity. Then, data augmentation (DA) is executed by oversampling based upon Synthetic Minority Over-sampling Technique (SMOTE). At last, attack detection is conducted utilizing EfficientNet-DQNN. Furthermore, EfficientNet-DQNN is formed by incorporation of EfficientNet-B3-Attn-2 with DQNN. In addition, EfficientNet-DQNN attained 89.8% of F1-score, 90.4% of accuracy, 91.1% of precision and 91.2% of recall using BOT-IOT dataset at K-Fold is 9.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-25"},"PeriodicalIF":1.1,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141433400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimized deep strategy for recognition and alleviation of DDoS attack in SD-IoT. 用于识别和缓解 SD-IoT 中 DDoS 攻击的优化深度策略。
IF 7.8 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-17 DOI: 10.1080/0954898X.2024.2356852
Kalpana Kumbhar, Prachi Mukherji

The attacks like distributed denial-of-service (DDoS) are termed as severe defence issues in data centres, and are considered real network threat. These types of attacks can produce huge disturbances in information technologies. In addition, it is a complex task to determine and fully alleviate DDoS attacks. The new strategy is developed to identify and alleviate DDoS attacks in the Software-Defined Internet of Things (SD-IoT) model. SD-IoT simulation is executed to gather data. The data collected through nodes of SD-IoT are fed to the selection of feature phases. Here, the hybrid process is considered to select features, wherein features, like wrapper-based technique, cosine similarity-based technique, and entropy-based technique are utilized to choose the significant features. Thereafter, the attack discovery process is done with Elephant Water Cycle (EWC)-assisted deep neuro-fuzzy network (DNFN). The EWC is adapted to train DNFN, and here EWC is obtained by grouping Elephant Herd Optimization (EHO) and water cycle algorithm (WCA). Finally, attack mitigation is carried out to secure the SD-IoT. The EWC-assisted DNFN revealed the highest accuracy of 96.9%, TNR of 98%, TPR of 90%, precision of 93%, and F1-score of 91%, when compared with other related techniques.

分布式拒绝服务(DDoS)等攻击被称为数据中心的严重防御问题,是真正的网络威胁。这类攻击会对信息技术造成巨大干扰。此外,确定和完全缓解 DDoS 攻击是一项复杂的任务。我们开发了一种新策略来识别和缓解软件定义物联网(SD-IoT)模型中的 DDoS 攻击。执行 SD-IoT 模拟以收集数据。通过 SD-IoT 节点收集到的数据被输入到特征选择阶段。在此,考虑采用混合流程来选择特征,利用基于包装的技术、基于余弦相似性的技术和基于熵的技术等特征来选择重要特征。之后,利用大象水循环(EWC)辅助深度神经模糊网络(DNFN)完成攻击发现过程。EWC 适用于训练 DNFN,这里的 EWC 是通过象群优化(EHO)和水循环算法(WCA)分组获得的。最后,为确保 SD-IoT 的安全,进行了攻击缓解。与其他相关技术相比,EWC 辅助 DNFN 的准确率最高,达到 96.9%,TNR 为 98%,TPR 为 90%,精度为 93%,F1-score 为 91%。
{"title":"An optimized deep strategy for recognition and alleviation of DDoS attack in SD-IoT.","authors":"Kalpana Kumbhar, Prachi Mukherji","doi":"10.1080/0954898X.2024.2356852","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2356852","url":null,"abstract":"<p><p>The attacks like distributed denial-of-service (DDoS) are termed as severe defence issues in data centres, and are considered real network threat. These types of attacks can produce huge disturbances in information technologies. In addition, it is a complex task to determine and fully alleviate DDoS attacks. The new strategy is developed to identify and alleviate DDoS attacks in the Software-Defined Internet of Things (SD-IoT) model. SD-IoT simulation is executed to gather data. The data collected through nodes of SD-IoT are fed to the selection of feature phases. Here, the hybrid process is considered to select features, wherein features, like wrapper-based technique, cosine similarity-based technique, and entropy-based technique are utilized to choose the significant features. Thereafter, the attack discovery process is done with Elephant Water Cycle (EWC)-assisted deep neuro-fuzzy network (DNFN). The EWC is adapted to train DNFN, and here EWC is obtained by grouping Elephant Herd Optimization (EHO) and water cycle algorithm (WCA). Finally, attack mitigation is carried out to secure the SD-IoT. The EWC-assisted DNFN revealed the highest accuracy of 96.9%, TNR of 98%, TPR of 90%, precision of 93%, and F1-score of 91%, when compared with other related techniques.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-32"},"PeriodicalIF":7.8,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141332509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-input robust diagnostics for railway point machines via audio signals. 通过音频信号为铁路点检机提供双输入稳健诊断。
IF 7.8 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-11 DOI: 10.1080/0954898X.2024.2358955
Tao Wen, Jinke Li, Rong Fei, Xinhong Hei, Zhiming Chen, Zhurong Wang

Railway Point Machine (RPM) is a fundamental component of railway infrastructure and plays a crucial role in ensuring the safe operation of trains. Its primary function is to divert trains from one track to another, enabling connections between different lines and facilitating route selection. By judiciously deploying turnouts, railway systems can provide efficient transportation services while ensuring the safety of passengers and cargo. As signal processing technologies develop rapidly, taking the easy acquisition advantages of audio signals, a fault diagnosis method for RPMs is proposed by considering noise and multi-channel signals. The proposed method consists of several stages. Initially, the signal is subjected to pre-processing steps, including cropping and channel separation. Subsequently, the signal undergoes noise addition using the Random Length and Dynamic Position Noises Superposition (RDS) module, followed by conversion to a greyscale image. To enhance the data, Synthetic Minority Oversampling Technique (SMOTE) module is applied. Finally, the training data is fed into a Dual-input Attention Convolutional Neural Network (DIACNN). By employing various experimental techniques and designing diverse datasets, our proposed method demonstrates excellent robustness and achieves an outstanding classification accuracy of 99.73%.

铁路点检机(RPM)是铁路基础设施的基本组成部分,在确保列车安全运行方面发挥着至关重要的作用。它的主要功能是将列车从一条轨道分流到另一条轨道,实现不同线路之间的连接,方便线路选择。通过合理部署道岔,铁路系统可以提供高效的运输服务,同时确保乘客和货物的安全。随着信号处理技术的飞速发展,利用音频信号易于采集的优势,提出了一种考虑噪声和多通道信号的转辙机故障诊断方法。所提出的方法包括几个阶段。首先,对信号进行预处理,包括裁剪和信道分离。随后,使用随机长度和动态位置噪声叠加(RDS)模块对信号进行噪声添加,然后转换为灰度图像。为了增强数据,应用了合成少数群体过度采样技术(SMOTE)模块。最后,将训练数据输入双输入注意卷积神经网络(DIACNN)。通过采用各种实验技术和设计不同的数据集,我们提出的方法表现出卓越的鲁棒性,分类准确率高达 99.73%。
{"title":"Dual-input robust diagnostics for railway point machines via audio signals.","authors":"Tao Wen, Jinke Li, Rong Fei, Xinhong Hei, Zhiming Chen, Zhurong Wang","doi":"10.1080/0954898X.2024.2358955","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2358955","url":null,"abstract":"<p><p>Railway Point Machine (RPM) is a fundamental component of railway infrastructure and plays a crucial role in ensuring the safe operation of trains. Its primary function is to divert trains from one track to another, enabling connections between different lines and facilitating route selection. By judiciously deploying turnouts, railway systems can provide efficient transportation services while ensuring the safety of passengers and cargo. As signal processing technologies develop rapidly, taking the easy acquisition advantages of audio signals, a fault diagnosis method for RPMs is proposed by considering noise and multi-channel signals. The proposed method consists of several stages. Initially, the signal is subjected to pre-processing steps, including cropping and channel separation. Subsequently, the signal undergoes noise addition using the Random Length and Dynamic Position Noises Superposition (RDS) module, followed by conversion to a greyscale image. To enhance the data, Synthetic Minority Oversampling Technique (SMOTE) module is applied. Finally, the training data is fed into a Dual-input Attention Convolutional Neural Network (DIACNN). By employing various experimental techniques and designing diverse datasets, our proposed method demonstrates excellent robustness and achieves an outstanding classification accuracy of 99.73%.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-22"},"PeriodicalIF":7.8,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141302120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Siamese domain adaptation convolutional neural network-based quaternion fractional order Meixner moments fostered big data analytical method for enhancing cloud data security. 基于深度暹罗域自适应卷积神经网络的四元数分数阶梅克斯纳矩大数据分析方法,用于增强云数据安全性。
IF 7.8 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-11 DOI: 10.1080/0954898X.2024.2354477
J Sulthan Alikhan, S Miruna Joe Amali, R Karthick

In this paper, Quaternion Fractional Order Meixner Moments-based Deep Siamese Domain Adaptation Convolutional Neural Network-based Big Data Analytical Technique is proposed for improving Cloud Data Security (DSDA-CNN-QFOMM-BD-CDS). The proposed methodology comprises six phases: data collection, transmission, pre-processing, storage, analysis, and security of data. Big data analysis methodologies start with the data collection phase. Deep Siamese domain adaptation convolutional Neural Network (DSDA-CNN) is applied to categorize the types of attacks in the cloud database during the data analysis process. During data security phase, Quaternion Fractional Order Meixner Moments (QFOMM) is employed to protect the cloud data for encryption with decryption. The proposed method is implemented in JAVA and assessed using performance metrics, including precision, sensitivity, accuracy, recall, specificity, f-measure, computational complexity information loss, compression ratio, throughput, encryption time, decryption time. The performance of the proposed method offers 23.31%, 15.64%, 18.89% better accuracy and 36.69%, 17.25%, 19.96% less information loss. When compared to existing methods like Fractional order discrete Tchebyshev encryption fostered big data analytical model to maximize the safety of cloud data depend on Enhanced Elman spike neural network (EESNN-FrDTM-BD-CDS), an innovative scheme architecture for safe authentication along data sharing in cloud enabled Big data Environment (LZMA-DBSCAN-BD-CDS).

本文提出了基于四元数分数阶 Meixner 矩的深度暹罗域自适应卷积神经网络大数据分析技术(DSDA-CNN-QFOMM-BD-CDS),以提高云数据的安全性。所提出的方法包括六个阶段:数据收集、传输、预处理、存储、分析和数据安全。大数据分析方法从数据收集阶段开始。在数据分析过程中,应用深度连体域自适应卷积神经网络(DSDA-CNN)对云数据库中的攻击类型进行分类。在数据安全阶段,采用四元数分数阶美克斯纳矩(QFOMM)对云数据进行加密和解密保护。所提出的方法在 JAVA 中实现,并使用性能指标进行评估,包括精确度、灵敏度、准确度、召回率、特异性、f-度量、计算复杂度信息损失、压缩比、吞吐量、加密时间、解密时间。所提方法的准确度分别提高了 23.31%、15.64% 和 18.89%,信息损失分别减少了 36.69%、17.25% 和 19.96%。与分数阶离散切比雪夫加密等现有方法相比,该方法基于增强型埃尔曼穗神经网络(EESNN-FrDTM-BD-CDS)建立了大数据分析模型,最大限度地提高了云数据的安全性;该方法是一种创新的方案架构,可在启用云的大数据环境(LZMA-DBSCAN-BD-CDS)中实现数据共享的安全认证。
{"title":"Deep Siamese domain adaptation convolutional neural network-based quaternion fractional order Meixner moments fostered big data analytical method for enhancing cloud data security.","authors":"J Sulthan Alikhan, S Miruna Joe Amali, R Karthick","doi":"10.1080/0954898X.2024.2354477","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2354477","url":null,"abstract":"<p><p>In this paper, Quaternion Fractional Order Meixner Moments-based Deep Siamese Domain Adaptation Convolutional Neural Network-based Big Data Analytical Technique is proposed for improving Cloud Data Security (DSDA-CNN-QFOMM-BD-CDS). The proposed methodology comprises six phases: data collection, transmission, pre-processing, storage, analysis, and security of data. Big data analysis methodologies start with the data collection phase. Deep Siamese domain adaptation convolutional Neural Network (DSDA-CNN) is applied to categorize the types of attacks in the cloud database during the data analysis process. During data security phase, Quaternion Fractional Order Meixner Moments (QFOMM) is employed to protect the cloud data for encryption with decryption. The proposed method is implemented in JAVA and assessed using performance metrics, including precision, sensitivity, accuracy, recall, specificity, f-measure, computational complexity information loss, compression ratio, throughput, encryption time, decryption time. The performance of the proposed method offers 23.31%, 15.64%, 18.89% better accuracy and 36.69%, 17.25%, 19.96% less information loss. When compared to existing methods like Fractional order discrete Tchebyshev encryption fostered big data analytical model to maximize the safety of cloud data depend on Enhanced Elman spike neural network (EESNN-FrDTM-BD-CDS), an innovative scheme architecture for safe authentication along data sharing in cloud enabled Big data Environment (LZMA-DBSCAN-BD-CDS).</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-28"},"PeriodicalIF":7.8,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141302119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Support vector machine-based stock market prediction using long short-term memory and convolutional neural network with aquila circle inspired optimization. 基于支持向量机的股票市场预测,使用长短期记忆和卷积神经网络,以及受奎拉圆圈启发的优化。
IF 7.8 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-10 DOI: 10.1080/0954898X.2024.2358957
J Karthick Myilvahanan, N Mohana Sundaram

Predicting the stock market is one of the significant chores and has a successful prediction of stock rates, and it helps in making correct decisions. The prediction of the stock market is the main challenge due to blaring, chaotic data as well as non-stationary data. In this research, the support vector machine (SVM) is devised for performing an effective stock market prediction. At first, the input time series data is considered and the pre-processing of data is done by employing a standard scalar. Then, the time intrinsic features are extracted and the suitable features are selected in the feature selection stage by eliminating other features using recursive feature elimination. Afterwards, the Long Short-Term Memory (LSTM) based prediction is done, wherein LSTM is trained to employ Aquila circle-inspired optimization (ACIO) that is newly introduced by merging Aquila optimizer (AO) with circle-inspired optimization algorithm (CIOA). On the other hand, delay-based matrix formation is conducted by considering input time series data. After that, convolutional neural network (CNN)-based prediction is performed, where CNN is tuned by the same ACIO. Finally, stock market prediction is executed utilizing SVM by fusing the predicted outputs attained from LSTM-based prediction and CNN-based prediction. Furthermore, the SVM attains better outcomes of minimum mean absolute percentage error; (MAPE) and normalized root-mean-square error (RMSE) with values about 0.378 and 0.294.

预测股市是一项重要任务,成功预测股票价格有助于做出正确决策。股票市场的预测是一项重大挑战,因为它面临着爆炸性、混沌数据和非稳态数据。本研究设计了支持向量机(SVM)来进行有效的股市预测。首先,考虑输入的时间序列数据,并采用标准标量对数据进行预处理。然后,提取时间内在特征,并在特征选择阶段使用递归特征消除法消除其他特征,从而选出合适的特征。然后,进行基于长短期记忆(LSTM)的预测,其中 LSTM 的训练采用了 Aquila 圆圈启发优化算法(ACIO),该算法是通过将 Aquila 优化器(AO)与圆圈启发优化算法(CIOA)合并而新引入的。另一方面,通过考虑输入的时间序列数据,进行基于延迟的矩阵形成。然后,执行基于卷积神经网络(CNN)的预测,其中 CNN 由相同的 ACIO 进行调整。最后,通过融合基于 LSTM 的预测和基于 CNN 的预测所获得的预测输出,利用 SVM 进行股市预测。此外,SVM 在最小平均绝对百分比误差 (MAPE) 和归一化均方根误差 (RMSE) 值约为 0.378 和 0.294 方面取得了更好的结果。
{"title":"Support vector machine-based stock market prediction using long short-term memory and convolutional neural network with aquila circle inspired optimization.","authors":"J Karthick Myilvahanan, N Mohana Sundaram","doi":"10.1080/0954898X.2024.2358957","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2358957","url":null,"abstract":"<p><p>Predicting the stock market is one of the significant chores and has a successful prediction of stock rates, and it helps in making correct decisions. The prediction of the stock market is the main challenge due to blaring, chaotic data as well as non-stationary data. In this research, the support vector machine (SVM) is devised for performing an effective stock market prediction. At first, the input time series data is considered and the pre-processing of data is done by employing a standard scalar. Then, the time intrinsic features are extracted and the suitable features are selected in the feature selection stage by eliminating other features using recursive feature elimination. Afterwards, the Long Short-Term Memory (LSTM) based prediction is done, wherein LSTM is trained to employ Aquila circle-inspired optimization (ACIO) that is newly introduced by merging Aquila optimizer (AO) with circle-inspired optimization algorithm (CIOA). On the other hand, delay-based matrix formation is conducted by considering input time series data. After that, convolutional neural network (CNN)-based prediction is performed, where CNN is tuned by the same ACIO. Finally, stock market prediction is executed utilizing SVM by fusing the predicted outputs attained from LSTM-based prediction and CNN-based prediction. Furthermore, the SVM attains better outcomes of minimum mean absolute percentage error; (MAPE) and normalized root-mean-square error (RMSE) with values about 0.378 and 0.294.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-36"},"PeriodicalIF":7.8,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141297344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure worst elite sailfish optimizer based routing and deep learning for black hole attack detection. 基于路由和深度学习的黑洞攻击检测的安全最差精英旗鱼优化器。
IF 7.8 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-10 DOI: 10.1080/0954898X.2024.2363353
Mandeep Kumar, Jahid Ali

The Wireless Sensor Network (WSN) is susceptible to two kinds of attacks, namely active attack and passive attack. In an active attack, the attacker directly communicates with the target system or network. In contrast, in passive attack, the attacker is in indirect contact with the network. To preserve the functionality and dependability of wireless sensor networks, this research has been conducted recently to detect and mitigate the black hole attacks. In this research, a Deep learning (DL) based black hole attack detection model is designed. The WSN simulation is the beginning stage of this process. Moreover, routing is the key process, where the data is passed to the base station (BS) via the shortest and finest route. The proposed Worst Elite Sailfish Optimization (WESFO) is utilized for routing. Moreover, black hole attack detection is performed in the BS. The Auto Encoder (AE) is employed in attack detection, which is trained with the use of the proposed WESFO algorithm. Additionally, the proposed model is validated in terms of delay, Packet Delivery Rate (PDR), throughput, False-Negative Rate (FNR), and False-Positive Rate (FPR) parameters with the corresponding outcomes like 25.64 s, 94.83%, 119.3, 0.084, and 0.135 are obtained.

无线传感器网络(WSN)容易受到两种攻击,即主动攻击和被动攻击。在主动攻击中,攻击者直接与目标系统或网络通信。相比之下,在被动攻击中,攻击者与网络是间接接触。为了保持无线传感器网络的功能性和可靠性,最近开展了这项研究,以检测和缓解黑洞攻击。本研究设计了一种基于深度学习(DL)的黑洞攻击检测模型。WSN 模拟是这一过程的起始阶段。此外,路由是关键过程,数据通过最短和最细的路由传递到基站(BS)。路由选择采用了所提出的最差精英旗鱼优化(WESFO)方法。此外,还在 BS 中执行黑洞攻击检测。在攻击检测中使用了自动编码器(AE),该编码器是利用提出的 WESFO 算法训练的。此外,提议的模型还在延迟、数据包交付率(PDR)、吞吐量、假阴性率(FNR)和假阳性率(FPR)参数方面进行了验证,并获得了 25.64 秒、94.83%、119.3、0.084 和 0.135 等相应结果。
{"title":"A secure worst elite sailfish optimizer based routing and deep learning for black hole attack detection.","authors":"Mandeep Kumar, Jahid Ali","doi":"10.1080/0954898X.2024.2363353","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2363353","url":null,"abstract":"<p><p>The Wireless Sensor Network (WSN) is susceptible to two kinds of attacks, namely active attack and passive attack. In an active attack, the attacker directly communicates with the target system or network. In contrast, in passive attack, the attacker is in indirect contact with the network. To preserve the functionality and dependability of wireless sensor networks, this research has been conducted recently to detect and mitigate the black hole attacks. In this research, a Deep learning (DL) based black hole attack detection model is designed. The WSN simulation is the beginning stage of this process. Moreover, routing is the key process, where the data is passed to the base station (BS) via the shortest and finest route. The proposed Worst Elite Sailfish Optimization (WESFO) is utilized for routing. Moreover, black hole attack detection is performed in the BS. The Auto Encoder (AE) is employed in attack detection, which is trained with the use of the proposed WESFO algorithm. Additionally, the proposed model is validated in terms of delay, Packet Delivery Rate (PDR), throughput, False-Negative Rate (FNR), and False-Positive Rate (FPR) parameters with the corresponding outcomes like 25.64 s, 94.83%, 119.3, 0.084, and 0.135 are obtained.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-26"},"PeriodicalIF":7.8,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141297343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speaker-based language identification for Ethio-Semitic languages using CRNN and hybrid features. 使用 CRNN 和混合特征,基于扬声器识别 Ethio-Semitic 语言。
IF 7.8 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-04 DOI: 10.1080/0954898X.2024.2359610
Malefia Demilie Melese, Amlakie Aschale Alemu, Ayodeji Olalekan Salau, Ibrahim Gashaw Kasa

Natural language is frequently employed for information exchange between humans and computers in modern digital environments. Natural Language Processing (NLP) is a basic requirement for technological advancement in the field of speech recognition. For additional NLP activities like speech-to-text translation, speech-to-speech translation, speaker recognition, and speech information retrieval, language identification (LID) is a prerequisite. In this paper, we developed a Language Identification (LID) model for Ethio-Semitic languages. We used a hybrid approach (a convolutional recurrent neural network (CRNN)), in addition to a mixed (Mel frequency cepstral coefficient (MFCC) and mel-spectrogram) approach, to build our LID model. The study focused on four Ethio-Semitic languages: Amharic, Ge'ez, Guragigna, and Tigrinya. By using data augmentation for the selected languages, we were able to expand our original dataset of 8 h of audio data to 24 h and 40 min. The proposed selected features, when evaluated, achieved an average performance accuracy of 98.1%, 98.6%, and 99.9% for testing, validation, and training, respectively. The results show that the CRNN model with (Mel-Spectrogram + MFCC) combination feature achieved the best results when compared to other existing models.

在现代数字环境中,人与计算机之间经常使用自然语言进行信息交流。自然语言处理(NLP)是语音识别领域技术进步的基本要求。对于语音到文本翻译、语音到语音翻译、说话人识别和语音信息检索等其他 NLP 活动,语言识别(LID)是先决条件。在本文中,我们为 Ethio-Semitic 语言开发了一个语言识别 (LID) 模型。我们采用了一种混合方法(卷积递归神经网络(CRNN))以及一种混合方法(梅尔频率倒频谱系数(MFCC)和梅尔频谱图)来建立 LID 模型。研究重点是四种民族-闪米特语言:阿姆哈拉语、盖伊兹语、古拉格尼亚语和提格雷尼亚语。通过对所选语言进行数据扩充,我们将原来 8 小时的音频数据集扩充到了 24 小时 40 分钟。在对所选特征进行评估时,建议的测试、验证和训练平均准确率分别达到 98.1%、98.6% 和 99.9%。结果表明,与其他现有模型相比,具有(Mel-Spectrogram + MFCC)组合特征的 CRNN 模型取得了最佳结果。
{"title":"Speaker-based language identification for Ethio-Semitic languages using CRNN and hybrid features.","authors":"Malefia Demilie Melese, Amlakie Aschale Alemu, Ayodeji Olalekan Salau, Ibrahim Gashaw Kasa","doi":"10.1080/0954898X.2024.2359610","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2359610","url":null,"abstract":"<p><p>Natural language is frequently employed for information exchange between humans and computers in modern digital environments. Natural Language Processing (NLP) is a basic requirement for technological advancement in the field of speech recognition. For additional NLP activities like speech-to-text translation, speech-to-speech translation, speaker recognition, and speech information retrieval, language identification (LID) is a prerequisite. In this paper, we developed a Language Identification (LID) model for Ethio-Semitic languages. We used a hybrid approach (a convolutional recurrent neural network (CRNN)), in addition to a mixed (Mel frequency cepstral coefficient (MFCC) and mel-spectrogram) approach, to build our LID model. The study focused on four Ethio-Semitic languages: Amharic, Ge'ez, Guragigna, and Tigrinya. By using data augmentation for the selected languages, we were able to expand our original dataset of 8 h of audio data to 24 h and 40 min. The proposed selected features, when evaluated, achieved an average performance accuracy of 98.1%, 98.6%, and 99.9% for testing, validation, and training, respectively. The results show that the CRNN model with (Mel-Spectrogram + MFCC) combination feature achieved the best results when compared to other existing models.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-23"},"PeriodicalIF":7.8,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141238784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ContrAttNet: Contribution and attention approach to multivariate time-series data imputation. ContrAttNet:多变量时间序列数据估算的贡献和关注方法。
IF 7.8 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-06-03 DOI: 10.1080/0954898X.2024.2360157
Yunfei Yin, Caihao Huang, Xianjian Bao

The imputation of missing values in multivariate time-series data is a basic and popular data processing technology. Recently, some studies have exploited Recurrent Neural Networks (RNNs) and Generative Adversarial Networks (GANs) to impute/fill the missing values in multivariate time-series data. However, when faced with datasets with high missing rates, the imputation error of these methods increases dramatically. To this end, we propose a neural network model based on dynamic contribution and attention, denoted as ContrAttNet. ContrAttNet consists of three novel modules: feature attention module, iLSTM (imputation Long Short-Term Memory) module, and 1D-CNN (1-Dimensional Convolutional Neural Network) module. ContrAttNet exploits temporal information and spatial feature information to predict missing values, where iLSTM attenuates the memory of LSTM according to the characteristics of the missing values, to learn the contributions of different features. Moreover, the feature attention module introduces an attention mechanism based on contributions, to calculate supervised weights. Furthermore, under the influence of these supervised weights, 1D-CNN processes the time-series data by treating them as spatial features. Experimental results show that ContrAttNet outperforms other state-of-the-art models in the missing value imputation of multivariate time-series data, with average 6% MAPE and 9% MAE on the benchmark datasets.

多元时间序列数据中缺失值的估算是一项基本且流行的数据处理技术。最近,一些研究利用循环神经网络(RNN)和生成对抗网络(GAN)来估算/填补多元时间序列数据中的缺失值。然而,当面对高缺失率的数据集时,这些方法的估算误差会急剧增加。为此,我们提出了一种基于动态贡献和注意力的神经网络模型,称为 ContrAttNet。ContrAttNet 由三个新模块组成:特征注意模块、iLSTM(估算长短期记忆)模块和 1D-CNN(一维卷积神经网络)模块。ContrAttNet 利用时间信息和空间特征信息预测缺失值,而 iLSTM 则根据缺失值的特征减弱 LSTM 的记忆,以学习不同特征的贡献。此外,特征关注模块引入了基于贡献的关注机制,以计算监督权重。此外,在这些监督权重的影响下,1D-CNN 将时间序列数据视为空间特征进行处理。实验结果表明,ContrAttNet 在多变量时间序列数据的缺失值估算方面优于其他最先进的模型,在基准数据集上的平均 MAPE 为 6%,MAE 为 9%。
{"title":"ContrAttNet: Contribution and attention approach to multivariate time-series data imputation.","authors":"Yunfei Yin, Caihao Huang, Xianjian Bao","doi":"10.1080/0954898X.2024.2360157","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2360157","url":null,"abstract":"<p><p>The imputation of missing values in multivariate time-series data is a basic and popular data processing technology. Recently, some studies have exploited Recurrent Neural Networks (RNNs) and Generative Adversarial Networks (GANs) to impute/fill the missing values in multivariate time-series data. However, when faced with datasets with high missing rates, the imputation error of these methods increases dramatically. To this end, we propose a neural network model based on dynamic contribution and attention, denoted as <b>ContrAttNet</b>. <b>ContrAttNet</b> consists of three novel modules: feature attention module, iLSTM (imputation Long Short-Term Memory) module, and 1D-CNN (1-Dimensional Convolutional Neural Network) module. <b>ContrAttNet</b> exploits temporal information and spatial feature information to predict missing values, where iLSTM attenuates the memory of LSTM according to the characteristics of the missing values, to learn the contributions of different features. Moreover, the feature attention module introduces an attention mechanism based on contributions, to calculate supervised weights. Furthermore, under the influence of these supervised weights, 1D-CNN processes the time-series data by treating them as spatial features. Experimental results show that <b>ContrAttNet</b> outperforms other state-of-the-art models in the missing value imputation of multivariate time-series data, with average 6% MAPE and 9% MAE on the benchmark datasets.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-24"},"PeriodicalIF":7.8,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141201474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid deep learning approach for sentiment analysis using text and emojis. 使用文本和表情符号进行情感分析的混合深度学习方法。
IF 7.8 3区 计算机科学 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE Pub Date : 2024-05-29 DOI: 10.1080/0954898X.2024.2349275
Arjun Kuruva, C Nagaraju Chiluka

Sentiment Analysis (SA) is a technique for categorizing texts based on the sentimental polarity of people's opinions. This paper introduces a sentiment analysis (SA) model with text and emojis. The two preprocessed data's are data with text and emojis and text without emojis. Feature extraction consists text features and text with emojis features. The text features are features like N-grams, modified Term Frequency-Inverse Document Frequency (TF-IDF), and Bag-of-Words (BoW) features extracted from the text. In classification, CNN (Conventional Neural Network) and MLP (Multi-Layer Perception) use emojis and text-based SA. The CNN weight is optimized by a new Electric fish Customized Shark Smell Optimization (ECSSO) Algorithm. Similarly, the text-based SA is carried out by hybrid Long Short-Term Memory (LSTM) and Recurrent Neural Network (RNN) classifiers. The bagged data are given as input to the classification process via RNN and LSTM. Here, the weight of LSTM is optimized by the suggested ECSSO algorithm. Then, the mean of LSTM and RNN determines the final output. The specificity of the developed scheme is 29.01%, 42.75%, 23.88%,22.07%, 25.31%, 18.42%, 5.68%, 10.34%, 6.20%, 6.64%, and 6.84% better for 70% than other models. The efficiency of the proposed scheme is computed and evaluated.

情感分析(Sentiment Analysis,SA)是一种根据人们观点的情感极性对文本进行分类的技术。本文介绍了一种包含文本和表情符号的情感分析(SA)模型。两种预处理数据分别是包含文本和表情符号的数据和不包含表情符号的文本数据。特征提取包括文本特征和带有表情符号的文本特征。文本特征是从文本中提取的 N-grams、修改后的词频-反向文档频率(TF-IDF)和词袋(BoW)等特征。在分类中,CNN(传统神经网络)和 MLP(多层感知)使用表情符号和基于文本的 SA。CNN 的权重通过新的电鱼定制鲨鱼气味优化算法(ECSSO)进行优化。同样,基于文本的 SA 由混合长短期记忆(LSTM)和循环神经网络(RNN)分类器执行。袋装数据通过 RNN 和 LSTM 作为分类过程的输入。在这里,LSTM 的权重通过建议的 ECSSO 算法进行优化。然后,LSTM 和 RNN 的平均值决定最终输出。所开发方案的特异性分别为 29.01%、42.75%、23.88%、22.07%、25.31%、18.42%、5.68%、10.34%、6.20%、6.64% 和 6.84%,70% 优于其他模型。计算并评估了建议方案的效率。
{"title":"Hybrid deep learning approach for sentiment analysis using text and emojis.","authors":"Arjun Kuruva, C Nagaraju Chiluka","doi":"10.1080/0954898X.2024.2349275","DOIUrl":"https://doi.org/10.1080/0954898X.2024.2349275","url":null,"abstract":"<p><p>Sentiment Analysis (SA) is a technique for categorizing texts based on the sentimental polarity of people's opinions. This paper introduces a sentiment analysis (SA) model with text and emojis. The two preprocessed data's are data with text and emojis and text without emojis. Feature extraction consists text features and text with emojis features. The text features are features like N-grams, modified Term Frequency-Inverse Document Frequency (TF-IDF), and Bag-of-Words (BoW) features extracted from the text. In classification, CNN (Conventional Neural Network) and MLP (Multi-Layer Perception) use emojis and text-based SA. The CNN weight is optimized by a new Electric fish Customized Shark Smell Optimization (ECSSO) Algorithm. Similarly, the text-based SA is carried out by hybrid Long Short-Term Memory (LSTM) and Recurrent Neural Network (RNN) classifiers. The bagged data are given as input to the classification process via RNN and LSTM. Here, the weight of LSTM is optimized by the suggested ECSSO algorithm. Then, the mean of LSTM and RNN determines the final output. The specificity of the developed scheme is 29.01%, 42.75%, 23.88%,22.07%, 25.31%, 18.42%, 5.68%, 10.34%, 6.20%, 6.64%, and 6.84% better for 70% than other models. The efficiency of the proposed scheme is computed and evaluated.</p>","PeriodicalId":54735,"journal":{"name":"Network-Computation in Neural Systems","volume":" ","pages":"1-30"},"PeriodicalIF":7.8,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141162790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Network-Computation in Neural Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1