首页 > 最新文献

Array最新文献

英文 中文
DART: A Solution for decentralized federated learning model robustness analysis DART:分散联合学习模型稳健性分析解决方案
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100360

Federated Learning (FL) has emerged as a promising approach to address privacy concerns inherent in Machine Learning (ML) practices. However, conventional FL methods, particularly those following the Centralized FL (CFL) paradigm, utilize a central server for global aggregation, which exhibits limitations such as bottleneck and single point of failure. To address these issues, the Decentralized FL (DFL) paradigm has been proposed, which removes the client–server boundary and enables all participants to engage in model training and aggregation tasks. Nevertheless, as CFL, DFL remains vulnerable to adversarial attacks, notably poisoning attacks that undermine model performance. While existing research on model robustness has predominantly focused on CFL, there is a noteworthy gap in understanding the model robustness of the DFL paradigm. In this paper, a thorough review of poisoning attacks targeting the model robustness in DFL systems, as well as their corresponding countermeasures, are presented. Additionally, a solution called DART is proposed to evaluate the robustness of DFL models, which is implemented and integrated into a DFL platform. Through extensive experiments, this paper compares the behavior of CFL and DFL under diverse poisoning attacks, pinpointing key factors affecting attack spread and effectiveness within the DFL. It also evaluates the performance of different defense mechanisms and investigates whether defense mechanisms designed for CFL are compatible with DFL. The empirical results provide insights into research challenges and suggest ways to improve the robustness of DFL models for future research.

联合学习(FL)已成为解决机器学习(ML)实践中固有的隐私问题的一种有前途的方法。然而,传统的联机学习方法,尤其是那些遵循集中式联机学习(CFL)范式的方法,利用中央服务器进行全局聚合,存在瓶颈和单点故障等局限性。为了解决这些问题,有人提出了分散式 FL(DFL)范例,它消除了客户端与服务器之间的界限,使所有参与者都能参与模型训练和聚合任务。然而,与 CFL 一样,DFL 仍然容易受到恶意攻击,特别是破坏模型性能的中毒攻击。虽然现有的模型鲁棒性研究主要集中在 CFL 上,但在了解 DFL 范例的模型鲁棒性方面还存在值得注意的差距。本文全面回顾了针对 DFL 系统模型鲁棒性的中毒攻击及其相应对策。此外,本文还提出了一种名为 DART 的解决方案来评估 DFL 模型的鲁棒性,并将其实施和集成到 DFL 平台中。通过大量实验,本文比较了 CFL 和 DFL 在各种中毒攻击下的行为,指出了影响 DFL 内攻击传播和有效性的关键因素。本文还评估了不同防御机制的性能,并研究了为 CFL 设计的防御机制是否与 DFL 兼容。实证结果为研究挑战提供了见解,并为未来研究提出了提高 DFL 模型稳健性的方法。
{"title":"DART: A Solution for decentralized federated learning model robustness analysis","authors":"","doi":"10.1016/j.array.2024.100360","DOIUrl":"10.1016/j.array.2024.100360","url":null,"abstract":"<div><p>Federated Learning (FL) has emerged as a promising approach to address privacy concerns inherent in Machine Learning (ML) practices. However, conventional FL methods, particularly those following the Centralized FL (CFL) paradigm, utilize a central server for global aggregation, which exhibits limitations such as bottleneck and single point of failure. To address these issues, the Decentralized FL (DFL) paradigm has been proposed, which removes the client–server boundary and enables all participants to engage in model training and aggregation tasks. Nevertheless, as CFL, DFL remains vulnerable to adversarial attacks, notably poisoning attacks that undermine model performance. While existing research on model robustness has predominantly focused on CFL, there is a noteworthy gap in understanding the model robustness of the DFL paradigm. In this paper, a thorough review of poisoning attacks targeting the model robustness in DFL systems, as well as their corresponding countermeasures, are presented. Additionally, a solution called <em>DART</em> is proposed to evaluate the robustness of DFL models, which is implemented and integrated into a DFL platform. Through extensive experiments, this paper compares the behavior of CFL and DFL under diverse poisoning attacks, pinpointing key factors affecting attack spread and effectiveness within the DFL. It also evaluates the performance of different defense mechanisms and investigates whether defense mechanisms designed for CFL are compatible with DFL. The empirical results provide insights into research challenges and suggest ways to improve the robustness of DFL models for future research.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000262/pdfft?md5=435488fb30eb056a2cc218da941ac1cf&pid=1-s2.0-S2590005624000262-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142130225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat intelligence named entity recognition techniques based on few-shot learning 基于少量学习的威胁情报命名实体识别技术
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100364

In today’s digital and internet era, threat intelligence analysis is of paramount importance to ensure network and information security. Named Entity Recognition (NER) is a fundamental task in natural language processing, aimed at identifying and extracting specific types of named entities from text, such as person names, locations, organization names, dates, times, currencies, and more. The quality of entities determines the effectiveness of upper-layer applications such as knowledge graphs. Recently, there has been a scarcity of training data in the threat intelligence field, and single models suffer from poor generalization ability. To address this, we propose a multi-view learning model, named the Few-shot Threat Intelligence Named Entity Recognition Model (FTM). We enhance the fusion method based on FTM, and further propose the FTM-GRU (Gate Recurrent Unit) model. The FTM model is based on the Tri-training algorithm to collaboratively train three few-shot NER models, leveraging the complementary nature of different model views to enable them to capture more threat intelligence domain knowledge at the coding level.FTM-GRU improves the fusion of multiple views. FTM-GRU uses the improved GRU model structure to control the memory and forgetting of view information, and introduces a relevance calculation unit to avoid redundancy of view information while highlighting important semantic features. We label and construct a few-shot Threat Intelligence Dataset (TID), and experiments on TID as well as the publicly available National Vulnerability Database (NVD) validate the effectiveness of our model for NER in the threat intelligence domain. Experimental results demonstrate that our proposed model achieves better recognition results in the task.

在当今的数字和互联网时代,威胁情报分析对确保网络和信息安全至关重要。命名实体识别(NER)是自然语言处理中的一项基本任务,旨在从文本中识别和提取特定类型的命名实体,如人名、地点、组织名称、日期、时间、货币等。实体的质量决定了知识图谱等上层应用的有效性。最近,威胁情报领域缺乏训练数据,单一模型的泛化能力较差。针对这一问题,我们提出了一种多视角学习模型,命名为 "Few-shot Threat Intelligence Named Entity Recognition Model (FTM)"。我们改进了基于 FTM 的融合方法,并进一步提出了 FTM-GRU(门递归单元)模型。FTM 模型基于 Tri-training 算法,协同训练三个 few-shot NER 模型,利用不同模型视图的互补性,使它们能够在编码层面捕获更多的威胁情报领域知识。FTM-GRU 使用改进的 GRU 模型结构来控制视图信息的记忆和遗忘,并引入相关性计算单元来避免视图信息的冗余,同时突出重要的语义特征。我们标注并构建了一个少量的威胁情报数据集(TID),并在 TID 和公开的国家漏洞数据库(NVD)上进行了实验,验证了我们的模型在威胁情报领域的 NER 中的有效性。实验结果表明,我们提出的模型在任务中取得了更好的识别效果。
{"title":"Threat intelligence named entity recognition techniques based on few-shot learning","authors":"","doi":"10.1016/j.array.2024.100364","DOIUrl":"10.1016/j.array.2024.100364","url":null,"abstract":"<div><p>In today’s digital and internet era, threat intelligence analysis is of paramount importance to ensure network and information security. Named Entity Recognition (NER) is a fundamental task in natural language processing, aimed at identifying and extracting specific types of named entities from text, such as person names, locations, organization names, dates, times, currencies, and more. The quality of entities determines the effectiveness of upper-layer applications such as knowledge graphs. Recently, there has been a scarcity of training data in the threat intelligence field, and single models suffer from poor generalization ability. To address this, we propose a multi-view learning model, named the Few-shot Threat Intelligence Named Entity Recognition Model (FTM). We enhance the fusion method based on FTM, and further propose the FTM-GRU (Gate Recurrent Unit) model. The FTM model is based on the Tri-training algorithm to collaboratively train three few-shot NER models, leveraging the complementary nature of different model views to enable them to capture more threat intelligence domain knowledge at the coding level.FTM-GRU improves the fusion of multiple views. FTM-GRU uses the improved GRU model structure to control the memory and forgetting of view information, and introduces a relevance calculation unit to avoid redundancy of view information while highlighting important semantic features. We label and construct a few-shot Threat Intelligence Dataset (TID), and experiments on TID as well as the publicly available National Vulnerability Database (NVD) validate the effectiveness of our model for NER in the threat intelligence domain. Experimental results demonstrate that our proposed model achieves better recognition results in the task.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000304/pdfft?md5=d191f5b484b3734ea988ad3ecd18a1f3&pid=1-s2.0-S2590005624000304-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142168608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autonomous UAV navigation using deep learning-based computer vision frameworks: A systematic literature review 使用基于深度学习的计算机视觉框架进行无人机自主导航:系统性文献综述
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100361

The increasing use of unmanned aerial vehicles (UAVs) in both military and civilian applications, such as infrastructure inspection, package delivery, and recreational activities, underscores the importance of enhancing their autonomous functionalities. Artificial intelligence (AI), particularly deep learning-based computer vision (DL-based CV), plays a crucial role in this enhancement. This paper aims to provide a systematic literature review (SLR) of Scopus-indexed research studies published from 2019 to 2024, focusing on DL-based CV approaches for autonomous UAV applications. By analyzing 173 studies, we categorize the research into four domains: sensing and inspection, landing, surveillance and tracking, and search and rescue. Our review reveals a significant increase in research utilizing computer vision for UAV applications, with over 39.5 % of studies employing the You Only Look Once (YOLO) framework. We discuss the key findings, including the dominant trends, challenges, and opportunities in the field, and highlight emerging technologies such as in-sensor computing. This review provides valuable insights into the current state and future directions of DL-based CV for autonomous UAVs, emphasizing its growing significance as legislative frameworks evolve to support these technologies.

无人驾驶飞行器(UAV)在基础设施检测、包裹递送和娱乐活动等军事和民用领域的应用日益增多,这凸显了增强其自主功能的重要性。人工智能(AI),尤其是基于深度学习的计算机视觉(DL-based CV),在这种增强中发挥着至关重要的作用。本文旨在对 2019 年至 2024 年期间发表的 Scopus 索引研究进行系统性文献综述(SLR),重点关注自主无人机应用中基于 DL 的 CV 方法。通过分析 173 项研究,我们将研究分为四个领域:感知和检测、着陆、监视和跟踪以及搜索和救援。我们的综述显示,利用计算机视觉进行无人机应用的研究大幅增加,超过 39.5% 的研究采用了 "只看一遍"(YOLO)框架。我们讨论了主要发现,包括该领域的主要趋势、挑战和机遇,并重点介绍了传感器内计算等新兴技术。本综述为自主无人机基于 DL 的 CV 的现状和未来发展方向提供了有价值的见解,并强调了随着支持这些技术的立法框架不断发展,其重要性也在不断增加。
{"title":"Autonomous UAV navigation using deep learning-based computer vision frameworks: A systematic literature review","authors":"","doi":"10.1016/j.array.2024.100361","DOIUrl":"10.1016/j.array.2024.100361","url":null,"abstract":"<div><p>The increasing use of unmanned aerial vehicles (UAVs) in both military and civilian applications, such as infrastructure inspection, package delivery, and recreational activities, underscores the importance of enhancing their autonomous functionalities. Artificial intelligence (AI), particularly deep learning-based computer vision (DL-based CV), plays a crucial role in this enhancement. This paper aims to provide a systematic literature review (SLR) of Scopus-indexed research studies published from 2019 to 2024, focusing on DL-based CV approaches for autonomous UAV applications. By analyzing 173 studies, we categorize the research into four domains: sensing and inspection, landing, surveillance and tracking, and search and rescue. Our review reveals a significant increase in research utilizing computer vision for UAV applications, with over 39.5 % of studies employing the You Only Look Once (YOLO) framework. We discuss the key findings, including the dominant trends, challenges, and opportunities in the field, and highlight emerging technologies such as in-sensor computing. This review provides valuable insights into the current state and future directions of DL-based CV for autonomous UAVs, emphasizing its growing significance as legislative frameworks evolve to support these technologies.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000274/pdfft?md5=49538d0ae336567b2c721a5cb431f7e9&pid=1-s2.0-S2590005624000274-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142151982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and supporting adaptive Complex Data-Intensive Web Systems via XML and the O-O paradigm: The OO-XAHM model 通过 XML 和 O-O 范式为自适应复杂数据密集型网络系统建模和提供支持:OO-XAHM 模型
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100363

The data model is a critical component of an Adaptive Web System (AWS). The major goals of such a data model are describing the application domain of the AWS and capturing data about the user in order to support the “adaptation effect”. There have been many proposals for data models, principally based on knowledge representation, machine learning, logic and reasoning, and, recently, ontologies. These models are focused on the implementation of the core layer of AWS, that is realizing the adaptation of contents and presentations of the system, but sometimes they are poor with respect to the application domain design. In this paper, we present an extension of the state-of-the-art XML Adaptive Hypermedia Model (XAHM), Object-Oriented XAHM (OO-XAHM) that supports the application domain modeling using an object-oriented approach. We also provide the formal definition of the model, its description via Unified Modeling Language (UML), and its implementation using XML Schema. Finally, we provide a complete case study that focuses the attention on the well-known Italian archaeological site Pompeii.

数据模型是自适应网络系统(AWS)的重要组成部分。这种数据模型的主要目标是描述自适应网络系统的应用领域和获取用户数据,以支持 "自适应效果"。关于数据模型的建议有很多,主要是基于知识表示、机器学习、逻辑和推理,以及最近的本体论。这些模型侧重于 AWS 核心层的实现,即实现系统内容和表现形式的适应性,但有时它们在应用领域设计方面存在缺陷。在本文中,我们介绍了最先进的 XML 自适应超媒体模型(XAHM)的扩展,即面向对象的 XAHM(OO-XAHM),它支持使用面向对象的方法进行应用领域建模。我们还提供了该模型的正式定义、统一建模语言(UML)对其的描述以及 XML 模式对其的实现。最后,我们提供了一个完整的案例研究,重点关注著名的意大利庞贝考古遗址。
{"title":"Modeling and supporting adaptive Complex Data-Intensive Web Systems via XML and the O-O paradigm: The OO-XAHM model","authors":"","doi":"10.1016/j.array.2024.100363","DOIUrl":"10.1016/j.array.2024.100363","url":null,"abstract":"<div><p>The <em>data model</em> is a critical component of an <em>Adaptive Web System</em> (AWS). The major goals of such a data model are describing the <em>application domain</em> of the AWS and capturing data about the user in order to support the “adaptation effect”. There have been many proposals for data models, principally based on knowledge representation, machine learning, logic and reasoning, and, recently, ontologies. These models are focused on the implementation of the core layer of AWS, that is realizing the adaptation of contents and presentations of the system, but sometimes they are poor with respect to the application domain design. In this paper, we present an extension of the state-of-the-art <em>XML Adaptive Hypermedia Model</em> (XAHM), <em>Object-Oriented XAHM</em> (OO-XAHM) that supports the application domain modeling using an <em>object-oriented approach</em>. We also provide the formal definition of the model, its description via <em>Unified Modeling Language</em> (UML), and its implementation using <em>XML Schema</em>. Finally, we provide a complete case study that focuses the attention on the well-known Italian archaeological site <em>Pompeii</em>.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000298/pdfft?md5=6d2e89f7a240ad4c3e1b8653672e843f&pid=1-s2.0-S2590005624000298-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142238109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reimagining otitis media diagnosis: A fusion of nested U-Net segmentation with graph theory-inspired feature set 重塑中耳炎诊断:嵌套 U-Net 细分与图论启发特征集的融合
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100362

Otitis media (OM) is a common infection or inflammation of the middle ear causing conductive hearing loss that primarily affects children and may delay speech, language, and cognitive development. OM can manifest itself in different forms, and can be diagnosed using (video) otoscopy (visualizing the tympanic membrane) or (video) pneumatic otoscopy and tympanometry. Accurate diagnosis of OM is challenging due to subtle differences in otoscopic features. This research aims to develop an automated computer-aided design (CAD) system to assist clinicians in diagnosing OM using otoscopy images. The ground truths, generated manually and validated by otolaryngologists, are utilized to train the proposed nested U-Net++ model. Ten clinically relevant gray level co-occurrence matrix (GLCM) and morphological features were extracted from the segmented Region of Interest (ROI) and validated for OM classification based on a statistical significance test. These features serve as input for a Graph Neural Network (GNN) model, the base model in our research. An optimized GNN model is proposed after ablation study of the base model. Three datasets, one private dataset, and two public ones have been used, where the private dataset is utilized for both training and testing, and the public datasets are used to test the robustness of the proposed GNN model only. The proposed GNN model obtained the highest accuracy in diagnosing OM: 99.38 %, 93.51 %, and 91.38 % for the private dataset, public dataset1, and public dataset2, respectively. The proposed methodology and results of this research might enhance clinicians' effectiveness in diagnosing OM.

中耳炎(OM)是一种常见的中耳感染或炎症,会导致传导性听力损失,主要影响儿童,并可能延迟言语、语言和认知能力的发展。中耳炎的表现形式多种多样,可通过(视频)耳内窥镜检查(观察鼓膜)或(视频)气动耳内窥镜检查和鼓室测量来诊断。由于耳镜特征的细微差别,准确诊断鼓室炎具有挑战性。本研究旨在开发一种自动计算机辅助设计(CAD)系统,以协助临床医生使用耳镜图像诊断耳鸣。利用人工生成并经耳鼻喉科医生验证的基本事实来训练所提出的嵌套 U-Net++ 模型。从分割的感兴趣区(ROI)中提取了十个与临床相关的灰度共现矩阵(GLCM)和形态学特征,并根据统计显著性测试对 OM 分类进行了验证。这些特征作为图神经网络(GNN)模型的输入,是我们研究的基础模型。在对基础模型进行消融研究后,我们提出了一个优化的 GNN 模型。我们使用了三个数据集,一个私有数据集和两个公共数据集,其中私有数据集用于训练和测试,公共数据集仅用于测试所提出的 GNN 模型的鲁棒性。在私人数据集、公共数据集 1 和公共数据集 2 中,所提出的 GNN 模型诊断 OM 的准确率最高:分别为 99.38 %、93.51 % 和 91.38 %。本研究提出的方法和结果可提高临床医生诊断 OM 的效率。
{"title":"Reimagining otitis media diagnosis: A fusion of nested U-Net segmentation with graph theory-inspired feature set","authors":"","doi":"10.1016/j.array.2024.100362","DOIUrl":"10.1016/j.array.2024.100362","url":null,"abstract":"<div><p>Otitis media (OM) is a common infection or inflammation of the middle ear causing conductive hearing loss that primarily affects children and may delay speech, language, and cognitive development. OM can manifest itself in different forms, and can be diagnosed using (video) otoscopy (visualizing the tympanic membrane) or (video) pneumatic otoscopy and tympanometry. Accurate diagnosis of OM is challenging due to subtle differences in otoscopic features. This research aims to develop an automated computer-aided design (CAD) system to assist clinicians in diagnosing OM using otoscopy images. The ground truths, generated manually and validated by otolaryngologists, are utilized to train the proposed nested U-Net++ model. Ten clinically relevant gray level co-occurrence matrix (GLCM) and morphological features were extracted from the segmented Region of Interest (ROI) and validated for OM classification based on a statistical significance test. These features serve as input for a Graph Neural Network (GNN) model, the base model in our research. An optimized GNN model is proposed after ablation study of the base model. Three datasets, one private dataset, and two public ones have been used, where the private dataset is utilized for both training and testing, and the public datasets are used to test the robustness of the proposed GNN model only. The proposed GNN model obtained the highest accuracy in diagnosing OM: 99.38 %, 93.51 %, and 91.38 % for the private dataset, public dataset1, and public dataset2, respectively. The proposed methodology and results of this research might enhance clinicians' effectiveness in diagnosing OM.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000286/pdfft?md5=206b3948d729d466a159c76421c4e068&pid=1-s2.0-S2590005624000286-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142171865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating machine learning techniques for enhanced glaucoma screening through Pupillary Light Reflex analysis 评估机器学习技术,通过瞳孔光反射分析加强青光眼筛查
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-08-02 DOI: 10.1016/j.array.2024.100359

Glaucoma is a leading cause of irreversible visual field degradation, significantly impacting ocular health. Timely identification and diagnosis of this condition are critical to prevent vision loss. A range of diagnostic techniques is employed to achieve this, from traditional methods reliant on expert interpretation to modern, fully computerized diagnostic approaches. The integration of computerized systems designed for the early detection and classification of clinical indicators of glaucoma holds immense potential to enhance the accuracy of disease diagnosis. Pupillary Light Reflex (PLR) analysis emerges as a promising avenue for glaucoma screening, mainly due to its cost-effectiveness compared to exams such as Optical Coherence Tomography (OCT), Humphrey Field Analyzer (HFA), and fundoscopic examinations. The noninvasive nature of PLR testing obviates the need for disposable components and agents for pupil dilation. This facilitates multiple successive administrations of the test and enables the possibility of remote execution. This study aimed to improve the automated diagnosis of glaucoma using PLR data, conducting an extensive comparative analysis incorporating neural networks and machine learning techniques. It also compared the performance of different data processing methods, including filtering techniques, feature extraction, data balancing, feature selection, and their effects on classification. The findings offer insights and guidelines for future methodologies in glaucoma screening utilizing pupillary light response signals.

青光眼是造成不可逆转的视野退化的主要原因,严重影响眼部健康。及时发现和诊断这种疾病对于防止视力丧失至关重要。为此,我们采用了一系列诊断技术,从依赖专家解读的传统方法到完全计算机化的现代诊断方法。整合计算机化系统,用于早期检测和分类青光眼的临床指标,在提高疾病诊断的准确性方面具有巨大的潜力。瞳孔光反射(PLR)分析是一种很有前景的青光眼筛查方法,这主要是因为与光学相干断层扫描(OCT)、汉弗莱视野分析仪(HFA)和眼底镜检查等检查方法相比,PLR分析具有成本效益。PLR 测试的非侵入性无需使用一次性组件和散瞳剂。这为连续多次进行测试提供了便利,并使远程执行测试成为可能。这项研究旨在利用 PLR 数据改进青光眼的自动诊断,结合神经网络和机器学习技术进行了广泛的比较分析。研究还比较了不同数据处理方法的性能,包括过滤技术、特征提取、数据平衡、特征选择及其对分类的影响。研究结果为今后利用瞳孔光反应信号筛查青光眼的方法提供了启示和指导。
{"title":"Evaluating machine learning techniques for enhanced glaucoma screening through Pupillary Light Reflex analysis","authors":"","doi":"10.1016/j.array.2024.100359","DOIUrl":"10.1016/j.array.2024.100359","url":null,"abstract":"<div><p>Glaucoma is a leading cause of irreversible visual field degradation, significantly impacting ocular health. Timely identification and diagnosis of this condition are critical to prevent vision loss. A range of diagnostic techniques is employed to achieve this, from traditional methods reliant on expert interpretation to modern, fully computerized diagnostic approaches. The integration of computerized systems designed for the early detection and classification of clinical indicators of glaucoma holds immense potential to enhance the accuracy of disease diagnosis. Pupillary Light Reflex (PLR) analysis emerges as a promising avenue for glaucoma screening, mainly due to its cost-effectiveness compared to exams such as Optical Coherence Tomography (OCT), Humphrey Field Analyzer (HFA), and fundoscopic examinations. The noninvasive nature of PLR testing obviates the need for disposable components and agents for pupil dilation. This facilitates multiple successive administrations of the test and enables the possibility of remote execution. This study aimed to improve the automated diagnosis of glaucoma using PLR data, conducting an extensive comparative analysis incorporating neural networks and machine learning techniques. It also compared the performance of different data processing methods, including filtering techniques, feature extraction, data balancing, feature selection, and their effects on classification. The findings offer insights and guidelines for future methodologies in glaucoma screening utilizing pupillary light response signals.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000250/pdfft?md5=17199a115ebd5deefc6427889a273079&pid=1-s2.0-S2590005624000250-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141962481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrating industry 4.0 technologies in defense manufacturing: Challenges, solutions, and potential opportunities 将工业 4.0 技术融入国防制造业:挑战、解决方案和潜在机遇
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-25 DOI: 10.1016/j.array.2024.100358

This paper explores the challenges and potential solutions related to data collection, integration, processing, and utilization in defense manufacturing within the context of Industry 4.0. While Industry 4.0 envisions the integration of various technologies to achieve seamless operations in industries, the unique characteristics of defense manufacturing, such as stringent data limitations and security requirements, make direct translation challenging. Through a comprehensive review of academic literature, key themes were identified, including quality control, digitalization, cyber–physical aspects, sustainability, risk management, ownership of information, and security. Drawing from the reviewed publications, potential solutions were distilled into related approaches, such as data governance frameworks, data exchange standards, blockchain, additive manufacturing, transparent digital supply chains, and smart factories. These solutions present opportunities for the Australian defense manufacturing industry to overcome the identified challenges and leverage the benefits of Industry 4.0, including improved quality control, increased efficiency, enhanced security, and optimized supply chains. By embracing these opportunities, the defense manufacturing sector can successfully navigate the complexities of Industry 4.0 and realize its vision of seamless integration for continued growth and success.

本文探讨了在工业 4.0 背景下,国防制造业在数据收集、集成、处理和利用方面面临的挑战和潜在解决方案。虽然工业 4.0 的设想是整合各种技术以实现工业的无缝操作,但国防制造业的独特性,如严格的数据限制和安全要求,使得直接转换具有挑战性。通过对学术文献的全面审查,确定了关键主题,包括质量控制、数字化、网络物理方面、可持续性、风险管理、信息所有权和安全性。根据所查阅的文献,将潜在的解决方案提炼为相关方法,如数据治理框架、数据交换标准、区块链、增材制造、透明数字供应链和智能工厂。这些解决方案为澳大利亚国防制造业提供了机遇,使其能够克服已确定的挑战,并充分利用工业 4.0 的优势,包括改进质量控制、提高效率、增强安全性和优化供应链。抓住这些机遇,国防制造业就能成功驾驭工业 4.0 的复杂性,实现无缝集成的愿景,从而实现持续增长和成功。
{"title":"Integrating industry 4.0 technologies in defense manufacturing: Challenges, solutions, and potential opportunities","authors":"","doi":"10.1016/j.array.2024.100358","DOIUrl":"10.1016/j.array.2024.100358","url":null,"abstract":"<div><p>This paper explores the challenges and potential solutions related to data collection, integration, processing, and utilization in defense manufacturing within the context of Industry 4.0. While Industry 4.0 envisions the integration of various technologies to achieve seamless operations in industries, the unique characteristics of defense manufacturing, such as stringent data limitations and security requirements, make direct translation challenging. Through a comprehensive review of academic literature, key themes were identified, including quality control, digitalization, cyber–physical aspects, sustainability, risk management, ownership of information, and security. Drawing from the reviewed publications, potential solutions were distilled into related approaches, such as data governance frameworks, data exchange standards, blockchain, additive manufacturing, transparent digital supply chains, and smart factories. These solutions present opportunities for the Australian defense manufacturing industry to overcome the identified challenges and leverage the benefits of Industry 4.0, including improved quality control, increased efficiency, enhanced security, and optimized supply chains. By embracing these opportunities, the defense manufacturing sector can successfully navigate the complexities of Industry 4.0 and realize its vision of seamless integration for continued growth and success.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000249/pdfft?md5=88e809dec133162fc9e62121f3747668&pid=1-s2.0-S2590005624000249-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141847197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advances of AI in image-based computer-aided diagnosis: A review 人工智能在基于图像的计算机辅助诊断方面的进展:综述
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-06 DOI: 10.1016/j.array.2024.100357

Over the past two decades, computer-aided detection and diagnosis have emerged as a field of research. The primary goal is to enhance the diagnostic and treatment procedures for radiologists and clinicians in medical image analysis. With the help of big data and advanced artificial intelligence (AI) technologies, such as machine learning and deep learning algorithms, the healthcare system can be made more convenient, active, efficient, and personalized. The primary goal of this literature survey was to present a thorough overview of the most important developments related to computer-aided diagnosis (CAD) systems in medical imaging. This survey is of considerable importance to researchers and professionals in both medical and computer sciences. Several reviews on the specific facets of CAD in medical imaging have been published.

Nevertheless, the main emphasis of this study was to cover the complete range of capabilities of CAD systems in medical imaging. This review article introduces background concepts used in typical CAD systems in medical imaging by outlining and comparing several methods frequently employed in recent studies. This article also presents a comprehensive and well-structured survey of CAD in medicine, drawing on a meticulous selection of relevant publications. Moreover, it describes the process of handling medical images and introduces state-of-the-art AI-based CAD technologies in medical imaging, along with future directions of CAD. This study indicates that deep learning algorithms are the most effective method to diagnose and detect diseases.

过去二十年来,计算机辅助检测和诊断已成为一个研究领域。其主要目标是提高放射科医生和临床医生在医学图像分析中的诊断和治疗程序。在大数据和先进的人工智能(AI)技术(如机器学习和深度学习算法)的帮助下,医疗系统可以变得更加便捷、主动、高效和个性化。本文献调查的主要目的是全面概述与医学影像计算机辅助诊断(CAD)系统相关的最重要发展。这项调查对医学和计算机科学领域的研究人员和专业人士都相当重要。尽管如此,本研究的主要重点是涵盖医学影像中计算机辅助诊断系统的全部功能。这篇综述文章通过概述和比较近期研究中经常使用的几种方法,介绍了典型医学影像 CAD 系统中使用的背景概念。本文还通过对相关出版物的精心筛选,对医学 CAD 进行了全面而结构合理的调查。此外,文章还描述了处理医学影像的过程,介绍了医学影像中基于人工智能的最先进 CAD 技术以及 CAD 的未来发展方向。这项研究表明,深度学习算法是诊断和检测疾病的最有效方法。
{"title":"Advances of AI in image-based computer-aided diagnosis: A review","authors":"","doi":"10.1016/j.array.2024.100357","DOIUrl":"10.1016/j.array.2024.100357","url":null,"abstract":"<div><p>Over the past two decades, computer-aided detection and diagnosis have emerged as a field of research. The primary goal is to enhance the diagnostic and treatment procedures for radiologists and clinicians in medical image analysis. With the help of big data and advanced artificial intelligence (AI) technologies, such as machine learning and deep learning algorithms, the healthcare system can be made more convenient, active, efficient, and personalized. The primary goal of this literature survey was to present a thorough overview of the most important developments related to computer-aided diagnosis (CAD) systems in medical imaging. This survey is of considerable importance to researchers and professionals in both medical and computer sciences. Several reviews on the specific facets of CAD in medical imaging have been published.</p><p>Nevertheless, the main emphasis of this study was to cover the complete range of capabilities of CAD systems in medical imaging. This review article introduces background concepts used in typical CAD systems in medical imaging by outlining and comparing several methods frequently employed in recent studies. This article also presents a comprehensive and well-structured survey of CAD in medicine, drawing on a meticulous selection of relevant publications. Moreover, it describes the process of handling medical images and introduces state-of-the-art AI-based CAD technologies in medical imaging, along with future directions of CAD. This study indicates that deep learning algorithms are the most effective method to diagnose and detect diseases.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000237/pdfft?md5=ac6bcca26057a0dab0256c9040860764&pid=1-s2.0-S2590005624000237-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141630093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Training a language model to learn the syntax of commands 训练语言模型以学习命令语法
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-03 DOI: 10.1016/j.array.2024.100355
Zafar Hussain , Jukka K. Nurminen , Perttu Ranta-aho

To protect systems from malicious activities, it is important to differentiate between valid and harmful commands. One way to achieve this is by learning the syntax of the commands, which is a complex task because of the expansive and evolving nature of command syntax. To address this, we harnessed the power of a language model. Our methodology involved constructing a specialized vocabulary from our commands dataset, and training a custom tokenizer with a Masked Language Model head, resulting in the development of a BERT-like language model. This model exhibits proficiency in learning command syntax by predicting masked tokens. In comparative analyses, our language model outperformed the Markov Model in categorizing commands using clustering algorithms (DBSCAN, HDBSCAN, OPTICS). The language model achieved higher Silhouette scores (0.72, 0.88, 0.85) compared to the Markov Model (0.53, 0.25, 0.06) and demonstrated significantly lower noise levels (2.63%, 5.39%, 8.49%) versus the Markov Model’s higher noise rates (9.31%, 29.85%, 50.35%). Further validation with manually crafted syntax and BERTScore assessments consistently produced metrics above 0.90 for precision, recall, and F1-score. Our language model excels at learning command syntax, enhancing protective measures against malicious activities.

要保护系统免受恶意活动的侵害,必须区分有效命令和有害命令。实现这一目标的方法之一是学习命令的语法,但由于命令语法的扩展性和演变性,这是一项复杂的任务。为此,我们利用了语言模型的强大功能。我们的方法包括从命令数据集中构建专门的词汇表,并使用屏蔽语言模型头训练自定义标记器,从而开发出类似于 BERT 的语言模型。该模型通过预测掩码标记来熟练学习命令语法。在比较分析中,我们的语言模型在使用聚类算法(DBSCAN、HDBSCAN、OPTICS)对命令进行分类方面的表现优于马尔可夫模型。与马尔可夫模型(0.53、0.25、0.06)相比,语言模型获得了更高的 Silhouette 分数(0.72、0.88、0.85),噪声水平(2.63%、5.39%、8.49%)也明显低于马尔可夫模型较高的噪声率(9.31%、29.85%、50.35%)。使用人工编写的语法和 BERTScore 评估进行进一步验证后,精确度、召回率和 F1 分数均超过了 0.90。我们的语言模型在学习命令语法方面表现出色,增强了针对恶意活动的保护措施。
{"title":"Training a language model to learn the syntax of commands","authors":"Zafar Hussain ,&nbsp;Jukka K. Nurminen ,&nbsp;Perttu Ranta-aho","doi":"10.1016/j.array.2024.100355","DOIUrl":"https://doi.org/10.1016/j.array.2024.100355","url":null,"abstract":"<div><p>To protect systems from malicious activities, it is important to differentiate between valid and harmful commands. One way to achieve this is by learning the syntax of the commands, which is a complex task because of the expansive and evolving nature of command syntax. To address this, we harnessed the power of a language model. Our methodology involved constructing a specialized vocabulary from our commands dataset, and training a custom tokenizer with a Masked Language Model head, resulting in the development of a BERT-like language model. This model exhibits proficiency in learning command syntax by predicting masked tokens. In comparative analyses, our language model outperformed the Markov Model in categorizing commands using clustering algorithms (DBSCAN, HDBSCAN, OPTICS). The language model achieved higher Silhouette scores (0.72, 0.88, 0.85) compared to the Markov Model (0.53, 0.25, 0.06) and demonstrated significantly lower noise levels (2.63%, 5.39%, 8.49%) versus the Markov Model’s higher noise rates (9.31%, 29.85%, 50.35%). Further validation with manually crafted syntax and BERTScore assessments consistently produced metrics above 0.90 for precision, recall, and F1-score. Our language model excels at learning command syntax, enhancing protective measures against malicious activities.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000213/pdfft?md5=68aae0cad29d029f8b3ee94e2999445f&pid=1-s2.0-S2590005624000213-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141592737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy impact assessments in the wild: A scoping review 野外隐私影响评估:范围审查
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-02 DOI: 10.1016/j.array.2024.100356
Leonardo Horn Iwaya , Ala Sarah Alaqra , Marit Hansen , Simone Fischer-Hübner

Privacy Impact Assessments (PIAs) offer a process for assessing the privacy impacts of a project or system. As a privacy engineering strategy, they are one of the main approaches to privacy by design, supporting the early identification of threats and controls. However, there is still a shortage of empirical evidence on their use and proven effectiveness in practice. To better understand the current literature and research, this paper provides a comprehensive Scoping Review (ScR) on the topic of PIAs “in the wild,” following the well-established Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) guidelines. This ScR includes 45 studies, providing an extensive synthesis of the existing body of knowledge, classifying types of research and publications, appraising the methodological quality of primary research, and summarising the positive and negative aspects of PIAs in practice, as reported by those studies. This ScR also identifies significant research gaps (e.g., evidence gaps from contradictory results and methodological gaps from research design deficiencies), future research pathways, and implications for researchers, practitioners, and policymakers developing and using PIA frameworks. As we conclude, there is still a significant need for more primary research on the topic, both qualitative and quantitative. A critical appraisal of qualitative studies revealed deficiencies in the methodological quality, and only four quantitative studies were identified, suggesting that current primary research remains incipient. Nonetheless, PIAs can be regarded as a prominent sub-area in the broader field of empirical privacy engineering, in which further scientific research to support existing practices is needed.

隐私影响评估 (PIA) 提供了一个评估项目或系统隐私影响的流程。作为一种隐私工程策略,隐私影响评估是通过设计实现隐私保护的主要方法之一,有助于及早识别威胁和控制措施。然而,关于它们的使用和在实践中被证明的有效性,仍然缺乏实证证据。为了更好地了解当前的文献和研究,本文按照成熟的系统综述和荟萃分析首选报告项目 (PRISMA) 指南,对 "野生 "的 PIA 主题进行了全面的范围界定综述 (SCR)。本系统综述包括 45 项研究,对现有知识体系进行了广泛综述,对研究和出版物类型进行了分类,对主要研究的方法论质量进行了评估,并总结了这些研究报告中 PIA 在实践中的积极和消极方面。本科学报告还指出了重要的研究缺口(例如,相互矛盾的结果造成的证据缺口和研究设计缺陷造成的方法缺口)、未来的研究路径,以及对研究人员、从业人员和政策制定者开发和使用 PIA 框架的影响。正如我们总结的那样,仍然非常需要对该主题进行更多的初级研究,包括定性和定量研究。对定性研究的批判性评估显示了方法论质量方面的缺陷,仅发现了四项定量研究,这表明当前的初级研究仍处于起步阶段。尽管如此,隐私影响评估可被视为更广泛的实证隐私工程领域中的一个突出子领域,需要进一步的科学研究来支持现有的做法。
{"title":"Privacy impact assessments in the wild: A scoping review","authors":"Leonardo Horn Iwaya ,&nbsp;Ala Sarah Alaqra ,&nbsp;Marit Hansen ,&nbsp;Simone Fischer-Hübner","doi":"10.1016/j.array.2024.100356","DOIUrl":"https://doi.org/10.1016/j.array.2024.100356","url":null,"abstract":"<div><p>Privacy Impact Assessments (PIAs) offer a process for assessing the privacy impacts of a project or system. As a privacy engineering strategy, they are one of the main approaches to privacy by design, supporting the early identification of threats and controls. However, there is still a shortage of empirical evidence on their use and proven effectiveness in practice. To better understand the current literature and research, this paper provides a comprehensive Scoping Review (ScR) on the topic of PIAs “in the wild,” following the well-established Preferred Reporting Items for Systematic reviews and Meta-Analyses (PRISMA) guidelines. This ScR includes 45 studies, providing an extensive synthesis of the existing body of knowledge, classifying types of research and publications, appraising the methodological quality of primary research, and summarising the positive and negative aspects of PIAs in practice, as reported by those studies. This ScR also identifies significant research gaps (e.g., evidence gaps from contradictory results and methodological gaps from research design deficiencies), future research pathways, and implications for researchers, practitioners, and policymakers developing and using PIA frameworks. As we conclude, there is still a significant need for more primary research on the topic, both qualitative and quantitative. A critical appraisal of qualitative studies revealed deficiencies in the methodological quality, and only four quantitative studies were identified, suggesting that current primary research remains incipient. Nonetheless, PIAs can be regarded as a prominent sub-area in the broader field of empirical privacy engineering, in which further scientific research to support existing practices is needed.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":null,"pages":null},"PeriodicalIF":2.3,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000225/pdfft?md5=fc78c3586c447695244b568609d2c91f&pid=1-s2.0-S2590005624000225-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141604898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Array
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1