首页 > 最新文献

Array最新文献

英文 中文
Combining computational linguistics with sentence embedding to create a zero-shot NLIDB 将计算语言学与句子嵌入相结合,创建零镜头 NLIDB
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-24 DOI: 10.1016/j.array.2024.100368
Yuriy Perezhohin , Fernando Peres , Mauro Castelli
Accessing relational databases using natural language is a challenging task, with existing methods often suffering from poor domain generalization and high computational costs. In this study, we propose a novel approach that eliminates the training phase while offering high adaptability across domains. Our method combines structured linguistic rules, a curated vocabulary, and pre-trained embedding models to accurately translate natural language queries into SQL. Experimental results on the SPIDER benchmark demonstrate the effectiveness of our approach, with execution accuracy rates of 72.03% on the training set and 70.83% on the development set, while maintaining domain flexibility. Furthermore, the proposed system outperformed two extensively trained models by up to 28.33% on the development set, demonstrating its efficiency. This research presents a significant advancement in zero-shot Natural Language Interfaces for Databases (NLIDBs), providing a resource-efficient alternative for generating accurate SQL queries from plain language inputs.
使用自然语言访问关系数据库是一项极具挑战性的任务,现有的方法往往存在领域通用性差和计算成本高等问题。在本研究中,我们提出了一种新颖的方法,它省去了训练阶段,同时提供了跨领域的高适应性。我们的方法结合了结构化语言规则、精心策划的词汇表和预训练的嵌入模型,可将自然语言查询准确地翻译成 SQL。SPIDER 基准的实验结果证明了我们方法的有效性,在保持领域灵活性的同时,训练集的执行准确率为 72.03%,开发集的执行准确率为 70.83%。此外,所提出的系统在开发集上的表现比两个经过广泛训练的模型高出 28.33%,证明了它的高效性。这项研究极大地推动了数据库自然语言接口(NLIDB)的发展,为从普通语言输入生成准确的 SQL 查询提供了一种资源节约型替代方案。
{"title":"Combining computational linguistics with sentence embedding to create a zero-shot NLIDB","authors":"Yuriy Perezhohin ,&nbsp;Fernando Peres ,&nbsp;Mauro Castelli","doi":"10.1016/j.array.2024.100368","DOIUrl":"10.1016/j.array.2024.100368","url":null,"abstract":"<div><div>Accessing relational databases using natural language is a challenging task, with existing methods often suffering from poor domain generalization and high computational costs. In this study, we propose a novel approach that eliminates the training phase while offering high adaptability across domains. Our method combines structured linguistic rules, a curated vocabulary, and pre-trained embedding models to accurately translate natural language queries into SQL. Experimental results on the SPIDER benchmark demonstrate the effectiveness of our approach, with execution accuracy rates of 72.03% on the training set and 70.83% on the development set, while maintaining domain flexibility. Furthermore, the proposed system outperformed two extensively trained models by up to 28.33% on the development set, demonstrating its efficiency. This research presents a significant advancement in zero-shot Natural Language Interfaces for Databases (NLIDBs), providing a resource-efficient alternative for generating accurate SQL queries from plain language inputs.</div></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"24 ","pages":"Article 100368"},"PeriodicalIF":2.3,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of automatic CNC machine with versatile applications in art, design, and engineering 开发可广泛应用于艺术、设计和工程领域的自动数控机床
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-21 DOI: 10.1016/j.array.2024.100369
Utpal Chandra Das , Nagoor Basha Shaik , Pannee Suanpang , Rajib Chandra Nath , Kedar Mallik Mantrala , Watit Benjapolakul , Manoj Gupta , Chanyanan Somthawinpongsai , Aziz Nanthaamornphong
The area of computer numerical control (CNC) machines has grown fast, and their use has risen significantly in recent years. This article presents the design and development of a CNC writing machine that uses an Arduino, a motor driver, a stepper motor, and a servo motor. The machine is meant to create 2D designs and write in numerous input languages using 3-axis simultaneous interpolated operations. The suggested machine is low-cost, simple to build, and can be operated with merely G codes. The performance of the CNC writing machine was assessed by testing it on a range of solid surfaces, including paper, cardboard, and wood. The results reveal that the machine can generate high-quality text and images with great accuracy and consistency. The proposed machine's ability to write in several input languages makes it appropriate for various applications, including art, design, and engineering.
计算机数控(CNC)机械领域发展迅速,近年来其使用量大幅上升。本文介绍了一台使用 Arduino、电机驱动器、步进电机和伺服电机的数控书写机的设计和开发。该机器可使用三轴同步插补操作创建二维设计并书写多种输入语言。所建议的机器成本低,制造简单,只需 G 代码即可操作。通过在一系列固体表面(包括纸张、纸板和木材)上进行测试,对数控书写设备的性能进行了评估。测试结果表明,该机器可以生成高质量的文本和图像,而且准确性和一致性极高。该机器能够使用多种输入语言进行书写,因此适用于各种应用领域,包括艺术、设计和工程。
{"title":"Development of automatic CNC machine with versatile applications in art, design, and engineering","authors":"Utpal Chandra Das ,&nbsp;Nagoor Basha Shaik ,&nbsp;Pannee Suanpang ,&nbsp;Rajib Chandra Nath ,&nbsp;Kedar Mallik Mantrala ,&nbsp;Watit Benjapolakul ,&nbsp;Manoj Gupta ,&nbsp;Chanyanan Somthawinpongsai ,&nbsp;Aziz Nanthaamornphong","doi":"10.1016/j.array.2024.100369","DOIUrl":"10.1016/j.array.2024.100369","url":null,"abstract":"<div><div>The area of computer numerical control (CNC) machines has grown fast, and their use has risen significantly in recent years. This article presents the design and development of a CNC writing machine that uses an Arduino, a motor driver, a stepper motor, and a servo motor. The machine is meant to create 2D designs and write in numerous input languages using 3-axis simultaneous interpolated operations. The suggested machine is low-cost, simple to build, and can be operated with merely G codes. The performance of the CNC writing machine was assessed by testing it on a range of solid surfaces, including paper, cardboard, and wood. The results reveal that the machine can generate high-quality text and images with great accuracy and consistency. The proposed machine's ability to write in several input languages makes it appropriate for various applications, including art, design, and engineering.</div></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"24 ","pages":"Article 100369"},"PeriodicalIF":2.3,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-model approach for one-shot lithium-ion battery state of health sequence prediction 一次性锂离子电池健康状态序列预测的双模型方法
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-03 DOI: 10.1016/j.array.2024.100367
Slimane Arbaoui , Ahmed Samet , Ali Ayadi , Tedjani Mesbahi , Romuald Boné
Lithium-ion batteries play a crucial role in powering various applications, including Electric Vehicles (EVs), underscoring the importance of accurately estimating their State Of Health (SOH) throughout their operational lifespan. This paper introduces two novel models: a Transformer (TOPS-SoH) and a Long Short-Term Memory based (LSTM-OSoH) for One-shot Prediction of SOH. The LSTM-OSoHexcels in accuracy, achieving a Masked Mean Absolute Error (MMAE) of less than 0.01 for precise SOH estimation, while the TOPS-SoHdemonstrates simplicity and efficiency, with accuracy comparable to state-of-the-art models. The TOPS-SoHmodel also offers additional interpretability by providing insights into the attention scores between inputs and outputs, highlighting the cycles used for estimation. These models were trained using the MIT battery dataset, with auto-encoders employed to reduce the dimensionality of the input data. Additionally, the models’ effectiveness was validated against a Bidirectional LSTM (BiLSTM) baseline, demonstrating superior performance in terms of lower MMAE, MMSE, and MAPE values, making them highly suitable for integration into Battery Management Systems (BMS). These findings contribute to advancing SOH estimation up to the End Of Life (EOL), which is crucial for ensuring the reliability and longevity of lithium-ion batteries in diverse applications.
锂离子电池在为包括电动汽车(EV)在内的各种应用提供动力方面发挥着至关重要的作用,这就凸显了在其整个运行寿命期间准确估计其健康状况(SOH)的重要性。本文介绍了两种新型模型:用于一次性预测 SOH 的变压器(TOPS-SoH)和基于长短期记忆(LSTM-OSoH)的模型。LSTM-OSoH 在精确度方面表现出色,其精确 SOH 估算的屏蔽绝对误差 (MMAE) 小于 0.01,而 TOPS-SoH 则表现出简单高效的特点,其精确度可与最先进的模型相媲美。TOPS-SoH 模型还提供了更多的可解释性,因为它提供了对输入和输出之间注意力分数的洞察,突出了用于估算的周期。这些模型使用麻省理工学院的电池数据集进行训练,并使用自动编码器降低输入数据的维度。此外,这些模型的有效性还通过了双向 LSTM(BiLSTM)基线的验证,在较低的 MMAE、MMSE 和 MAPE 值方面表现出色,因此非常适合集成到电池管理系统(BMS)中。这些研究成果有助于将 SOH 估算推进到寿命终止 (EOL),这对于确保锂离子电池在各种应用中的可靠性和使用寿命至关重要。
{"title":"Dual-model approach for one-shot lithium-ion battery state of health sequence prediction","authors":"Slimane Arbaoui ,&nbsp;Ahmed Samet ,&nbsp;Ali Ayadi ,&nbsp;Tedjani Mesbahi ,&nbsp;Romuald Boné","doi":"10.1016/j.array.2024.100367","DOIUrl":"10.1016/j.array.2024.100367","url":null,"abstract":"<div><div>Lithium-ion batteries play a crucial role in powering various applications, including Electric Vehicles (EVs), underscoring the importance of accurately estimating their State Of Health (SOH) throughout their operational lifespan. This paper introduces two novel models: a Transformer (TOPS-SoH) and a Long Short-Term Memory based (LSTM-OSoH) for One-shot Prediction of SOH. The LSTM-OSoHexcels in accuracy, achieving a Masked Mean Absolute Error (MMAE) of less than 0.01 for precise SOH estimation, while the TOPS-SoHdemonstrates simplicity and efficiency, with accuracy comparable to state-of-the-art models. The TOPS-SoHmodel also offers additional interpretability by providing insights into the attention scores between inputs and outputs, highlighting the cycles used for estimation. These models were trained using the MIT battery dataset, with auto-encoders employed to reduce the dimensionality of the input data. Additionally, the models’ effectiveness was validated against a Bidirectional LSTM (<em>BiLSTM</em>) baseline, demonstrating superior performance in terms of lower MMAE, MMSE, and MAPE values, making them highly suitable for integration into Battery Management Systems (BMS). These findings contribute to advancing SOH estimation up to the End Of Life (EOL), which is crucial for ensuring the reliability and longevity of lithium-ion batteries in diverse applications.</div></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"24 ","pages":"Article 100367"},"PeriodicalIF":2.3,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142420512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximizing influence via link prediction in evolving networks 通过演化网络中的链接预测实现影响力最大化
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-28 DOI: 10.1016/j.array.2024.100366
Kexin Zhang , Mo Li , Shuang Teng , Lingling Li , Yi Wang , Xuezhuan Zhao , Jinhong Di , Ji Zhang
Influence Maximization (IM), targeting the optimal selection of k seed nodes to maximize potential information dissemination in prospectively social networks, garners pivotal interest in diverse realms like viral marketing and political discourse dissemination. Despite receiving substantial scholarly attention, prevailing research predominantly addresses the IM problem within the confines of existing networks, thereby neglecting the dynamic evolutionary character of social networks. An inevitable requisite arises to explore the IM problem in social networks of future contexts, which is imperative for certain application scenarios. In this light, we introduce a novel problem, Influence Maximization in Future Networks (IMFN), aimed at resolving the IM problem within an anticipated future network framework. We establish that the IMFN problem is NP-hard and advocate a prospective solution framework, employing judiciously selected link prediction methods to forecast the future network, and subsequently applying a greedy algorithm to select the k most influential nodes. Moreover, we present SCOL (Sketch-based Cost-effective lazy forward selection algorithm Optimized with Labeling technique), a well-designed algorithm to accelerate the query of our IMFN problem. Extensive experimental results, rooted in five real-world datasets, are provided, affirming the efficacy and efficiency of the proffered solution and algorithms.
影响最大化(Influence Maximization,IM)的目标是优化 k 个种子节点的选择,以最大限度地提高潜在信息在前瞻性社交网络中的传播,它在病毒式营销和政治言论传播等不同领域引起了举足轻重的关注。尽管受到大量学者的关注,但目前的研究主要是在现有网络的范围内解决 IM 问题,从而忽视了社交网络的动态演化特性。探索未来社会网络中的即时通讯问题是一个必然的要求,这在某些应用场景中势在必行。有鉴于此,我们引入了一个新问题--未来网络中的影响力最大化(IMFN),旨在解决预期未来网络框架中的 IM 问题。我们发现 IMFN 问题具有 NP 难度,并提出了一种前瞻性的解决框架,即采用明智选择的链接预测方法来预测未来网络,然后应用贪婪算法来选择 k 个最具影响力的节点。此外,我们还提出了 SCOL(基于草图的高成本效益懒惰前向选择算法(Scetch-based Cost-effective lazy forward selection algorithm Optimized with Labeling technique),这是一种精心设计的算法,可加速对 IMFN 问题的查询。我们提供了基于五个真实数据集的大量实验结果,肯定了所提出的解决方案和算法的功效和效率。
{"title":"Maximizing influence via link prediction in evolving networks","authors":"Kexin Zhang ,&nbsp;Mo Li ,&nbsp;Shuang Teng ,&nbsp;Lingling Li ,&nbsp;Yi Wang ,&nbsp;Xuezhuan Zhao ,&nbsp;Jinhong Di ,&nbsp;Ji Zhang","doi":"10.1016/j.array.2024.100366","DOIUrl":"10.1016/j.array.2024.100366","url":null,"abstract":"<div><div><em>Influence Maximization</em> (IM), targeting the optimal selection of <span><math><mi>k</mi></math></span> seed nodes to maximize potential information dissemination in prospectively social networks, garners pivotal interest in diverse realms like viral marketing and political discourse dissemination. Despite receiving substantial scholarly attention, prevailing research predominantly addresses the IM problem within the confines of existing networks, thereby neglecting the dynamic evolutionary character of social networks. An inevitable requisite arises to explore the IM problem in social networks of future contexts, which is imperative for certain application scenarios. In this light, we introduce a novel problem, Influence Maximization in Future Networks (IMFN), aimed at resolving the IM problem within an anticipated future network framework. We establish that the IMFN problem is NP-hard and advocate a prospective solution framework, employing judiciously selected link prediction methods to forecast the future network, and subsequently applying a greedy algorithm to select the <span><math><mi>k</mi></math></span> most influential nodes. Moreover, we present SCOL (Sketch-based Cost-effective lazy forward selection algorithm Optimized with Labeling technique), a well-designed algorithm to accelerate the query of our IMFN problem. Extensive experimental results, rooted in five real-world datasets, are provided, affirming the efficacy and efficiency of the proffered solution and algorithms.</div></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"24 ","pages":"Article 100366"},"PeriodicalIF":2.3,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142420510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing generalizability of Deep Reinforcement Learning algorithms for Automated Vulnerability Assessment and Penetration Testing 评估用于自动漏洞评估和渗透测试的深度强化学习算法的通用性
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-27 DOI: 10.1016/j.array.2024.100365
Andrea Venturi , Mauro Andreolini , Mirco Marchetti , Michele Colajanni
Modern cybersecurity best practices and standards require continuous Vulnerability Assessment (VA) and Penetration Test (PT). These activities are human- and time-expensive. The research community is trying to propose autonomous or semi-autonomous solutions based on Deep Reinforcement Learning (DRL) agents, but current proposals require further investigations. We observe that related literature reports performance tests of the proposed agents against a limited subset of the hosts used to train the models, thus raising questions on their applicability in realistic scenarios. The main contribution of this paper is to fill this gap by investigating the generalization capabilities of existing DRL agents to extend their VAPT operations to hosts that were not used in the training phase. To this purpose, we define a novel VAPT environment through which we devise multiple evaluation scenarios. While evidencing the limited capabilities of shallow RL approaches, we consider three state-of-the-art deep RL agents, namely Deep Q-Network (DQN), Proximal Policy Optimization (PPO), and Advantage Actor–Critic (A2C), and use them as bases for VAPT operations. The results show that the algorithm using A2C DRL agent outperforms the others because it is more adaptable to unknown hosts and converges faster. Our methodology can guide future researchers and practitioners in designing a new generation of semi-autonomous VAPT tools that are suitable for real-world contexts.
现代网络安全最佳实践和标准要求持续进行漏洞评估 (VA) 和渗透测试 (PT)。这些活动耗费大量人力和时间。研究界正在尝试提出基于深度强化学习(DRL)代理的自主或半自主解决方案,但目前的建议还需要进一步研究。我们注意到,相关文献报告了针对用于训练模型的有限主机子集对所建议的代理进行的性能测试,从而对其在现实场景中的适用性提出了质疑。本文的主要贡献在于通过研究现有 DRL 代理的泛化能力,将其 VAPT 操作扩展到训练阶段未使用的主机,从而填补这一空白。为此,我们定义了一个新颖的 VAPT 环境,并通过该环境设计了多个评估场景。在证明浅层 RL 方法能力有限的同时,我们考虑了三种最先进的深层 RL 代理,即深层 Q 网络(DQN)、近端策略优化(PPO)和优势行为批判(A2C),并将它们作为 VAPT 操作的基础。结果表明,使用 A2C DRL 代理的算法优于其他算法,因为它对未知主机的适应性更强,收敛速度更快。我们的方法可以指导未来的研究人员和从业人员设计出适用于现实环境的新一代半自主 VAPT 工具。
{"title":"Assessing generalizability of Deep Reinforcement Learning algorithms for Automated Vulnerability Assessment and Penetration Testing","authors":"Andrea Venturi ,&nbsp;Mauro Andreolini ,&nbsp;Mirco Marchetti ,&nbsp;Michele Colajanni","doi":"10.1016/j.array.2024.100365","DOIUrl":"10.1016/j.array.2024.100365","url":null,"abstract":"<div><div>Modern cybersecurity best practices and standards require continuous Vulnerability Assessment (VA) and Penetration Test (PT). These activities are human- and time-expensive. The research community is trying to propose autonomous or semi-autonomous solutions based on Deep Reinforcement Learning (DRL) agents, but current proposals require further investigations. We observe that related literature reports performance tests of the proposed agents against a limited subset of the hosts used to train the models, thus raising questions on their applicability in realistic scenarios. The main contribution of this paper is to fill this gap by investigating the generalization capabilities of existing DRL agents to extend their VAPT operations to hosts that were not used in the training phase. To this purpose, we define a novel VAPT environment through which we devise multiple evaluation scenarios. While evidencing the limited capabilities of shallow RL approaches, we consider three state-of-the-art deep RL agents, namely Deep Q-Network (DQN), Proximal Policy Optimization (PPO), and Advantage Actor–Critic (A2C), and use them as bases for VAPT operations. The results show that the algorithm using A2C DRL agent outperforms the others because it is more adaptable to unknown hosts and converges faster. Our methodology can guide future researchers and practitioners in designing a new generation of semi-autonomous VAPT tools that are suitable for real-world contexts.</div></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"24 ","pages":"Article 100365"},"PeriodicalIF":2.3,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142420511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and supporting adaptive Complex Data-Intensive Web Systems via XML and the O-O paradigm: The OO-XAHM model 通过 XML 和 O-O 范式为自适应复杂数据密集型网络系统建模和提供支持:OO-XAHM 模型
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100363
A. Cuzzocrea , E. Fadda

The data model is a critical component of an Adaptive Web System (AWS). The major goals of such a data model are describing the application domain of the AWS and capturing data about the user in order to support the “adaptation effect”. There have been many proposals for data models, principally based on knowledge representation, machine learning, logic and reasoning, and, recently, ontologies. These models are focused on the implementation of the core layer of AWS, that is realizing the adaptation of contents and presentations of the system, but sometimes they are poor with respect to the application domain design. In this paper, we present an extension of the state-of-the-art XML Adaptive Hypermedia Model (XAHM), Object-Oriented XAHM (OO-XAHM) that supports the application domain modeling using an object-oriented approach. We also provide the formal definition of the model, its description via Unified Modeling Language (UML), and its implementation using XML Schema. Finally, we provide a complete case study that focuses the attention on the well-known Italian archaeological site Pompeii.

数据模型是自适应网络系统(AWS)的重要组成部分。这种数据模型的主要目标是描述自适应网络系统的应用领域和获取用户数据,以支持 "自适应效果"。关于数据模型的建议有很多,主要是基于知识表示、机器学习、逻辑和推理,以及最近的本体论。这些模型侧重于 AWS 核心层的实现,即实现系统内容和表现形式的适应性,但有时它们在应用领域设计方面存在缺陷。在本文中,我们介绍了最先进的 XML 自适应超媒体模型(XAHM)的扩展,即面向对象的 XAHM(OO-XAHM),它支持使用面向对象的方法进行应用领域建模。我们还提供了该模型的正式定义、统一建模语言(UML)对其的描述以及 XML 模式对其的实现。最后,我们提供了一个完整的案例研究,重点关注著名的意大利庞贝考古遗址。
{"title":"Modeling and supporting adaptive Complex Data-Intensive Web Systems via XML and the O-O paradigm: The OO-XAHM model","authors":"A. Cuzzocrea ,&nbsp;E. Fadda","doi":"10.1016/j.array.2024.100363","DOIUrl":"10.1016/j.array.2024.100363","url":null,"abstract":"<div><p>The <em>data model</em> is a critical component of an <em>Adaptive Web System</em> (AWS). The major goals of such a data model are describing the <em>application domain</em> of the AWS and capturing data about the user in order to support the “adaptation effect”. There have been many proposals for data models, principally based on knowledge representation, machine learning, logic and reasoning, and, recently, ontologies. These models are focused on the implementation of the core layer of AWS, that is realizing the adaptation of contents and presentations of the system, but sometimes they are poor with respect to the application domain design. In this paper, we present an extension of the state-of-the-art <em>XML Adaptive Hypermedia Model</em> (XAHM), <em>Object-Oriented XAHM</em> (OO-XAHM) that supports the application domain modeling using an <em>object-oriented approach</em>. We also provide the formal definition of the model, its description via <em>Unified Modeling Language</em> (UML), and its implementation using <em>XML Schema</em>. Finally, we provide a complete case study that focuses the attention on the well-known Italian archaeological site <em>Pompeii</em>.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"23 ","pages":"Article 100363"},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000298/pdfft?md5=6d2e89f7a240ad4c3e1b8653672e843f&pid=1-s2.0-S2590005624000298-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142238109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DART: A Solution for decentralized federated learning model robustness analysis DART:分散联合学习模型稳健性分析解决方案
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100360
Chao Feng , Alberto Huertas Celdrán , Jan von der Assen , Enrique Tomás Martínez Beltrán , Gérôme Bovet , Burkhard Stiller

Federated Learning (FL) has emerged as a promising approach to address privacy concerns inherent in Machine Learning (ML) practices. However, conventional FL methods, particularly those following the Centralized FL (CFL) paradigm, utilize a central server for global aggregation, which exhibits limitations such as bottleneck and single point of failure. To address these issues, the Decentralized FL (DFL) paradigm has been proposed, which removes the client–server boundary and enables all participants to engage in model training and aggregation tasks. Nevertheless, as CFL, DFL remains vulnerable to adversarial attacks, notably poisoning attacks that undermine model performance. While existing research on model robustness has predominantly focused on CFL, there is a noteworthy gap in understanding the model robustness of the DFL paradigm. In this paper, a thorough review of poisoning attacks targeting the model robustness in DFL systems, as well as their corresponding countermeasures, are presented. Additionally, a solution called DART is proposed to evaluate the robustness of DFL models, which is implemented and integrated into a DFL platform. Through extensive experiments, this paper compares the behavior of CFL and DFL under diverse poisoning attacks, pinpointing key factors affecting attack spread and effectiveness within the DFL. It also evaluates the performance of different defense mechanisms and investigates whether defense mechanisms designed for CFL are compatible with DFL. The empirical results provide insights into research challenges and suggest ways to improve the robustness of DFL models for future research.

联合学习(FL)已成为解决机器学习(ML)实践中固有的隐私问题的一种有前途的方法。然而,传统的联机学习方法,尤其是那些遵循集中式联机学习(CFL)范式的方法,利用中央服务器进行全局聚合,存在瓶颈和单点故障等局限性。为了解决这些问题,有人提出了分散式 FL(DFL)范例,它消除了客户端与服务器之间的界限,使所有参与者都能参与模型训练和聚合任务。然而,与 CFL 一样,DFL 仍然容易受到恶意攻击,特别是破坏模型性能的中毒攻击。虽然现有的模型鲁棒性研究主要集中在 CFL 上,但在了解 DFL 范例的模型鲁棒性方面还存在值得注意的差距。本文全面回顾了针对 DFL 系统模型鲁棒性的中毒攻击及其相应对策。此外,本文还提出了一种名为 DART 的解决方案来评估 DFL 模型的鲁棒性,并将其实施和集成到 DFL 平台中。通过大量实验,本文比较了 CFL 和 DFL 在各种中毒攻击下的行为,指出了影响 DFL 内攻击传播和有效性的关键因素。本文还评估了不同防御机制的性能,并研究了为 CFL 设计的防御机制是否与 DFL 兼容。实证结果为研究挑战提供了见解,并为未来研究提出了提高 DFL 模型稳健性的方法。
{"title":"DART: A Solution for decentralized federated learning model robustness analysis","authors":"Chao Feng ,&nbsp;Alberto Huertas Celdrán ,&nbsp;Jan von der Assen ,&nbsp;Enrique Tomás Martínez Beltrán ,&nbsp;Gérôme Bovet ,&nbsp;Burkhard Stiller","doi":"10.1016/j.array.2024.100360","DOIUrl":"10.1016/j.array.2024.100360","url":null,"abstract":"<div><p>Federated Learning (FL) has emerged as a promising approach to address privacy concerns inherent in Machine Learning (ML) practices. However, conventional FL methods, particularly those following the Centralized FL (CFL) paradigm, utilize a central server for global aggregation, which exhibits limitations such as bottleneck and single point of failure. To address these issues, the Decentralized FL (DFL) paradigm has been proposed, which removes the client–server boundary and enables all participants to engage in model training and aggregation tasks. Nevertheless, as CFL, DFL remains vulnerable to adversarial attacks, notably poisoning attacks that undermine model performance. While existing research on model robustness has predominantly focused on CFL, there is a noteworthy gap in understanding the model robustness of the DFL paradigm. In this paper, a thorough review of poisoning attacks targeting the model robustness in DFL systems, as well as their corresponding countermeasures, are presented. Additionally, a solution called <em>DART</em> is proposed to evaluate the robustness of DFL models, which is implemented and integrated into a DFL platform. Through extensive experiments, this paper compares the behavior of CFL and DFL under diverse poisoning attacks, pinpointing key factors affecting attack spread and effectiveness within the DFL. It also evaluates the performance of different defense mechanisms and investigates whether defense mechanisms designed for CFL are compatible with DFL. The empirical results provide insights into research challenges and suggest ways to improve the robustness of DFL models for future research.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"23 ","pages":"Article 100360"},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000262/pdfft?md5=435488fb30eb056a2cc218da941ac1cf&pid=1-s2.0-S2590005624000262-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142130225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autonomous UAV navigation using deep learning-based computer vision frameworks: A systematic literature review 使用基于深度学习的计算机视觉框架进行无人机自主导航:系统性文献综述
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100361
Aditya Vardhan Reddy Katkuri , Hakka Madan , Narendra Khatri , Antar Shaddad Hamed Abdul-Qawy , K. Sridhar Patnaik

The increasing use of unmanned aerial vehicles (UAVs) in both military and civilian applications, such as infrastructure inspection, package delivery, and recreational activities, underscores the importance of enhancing their autonomous functionalities. Artificial intelligence (AI), particularly deep learning-based computer vision (DL-based CV), plays a crucial role in this enhancement. This paper aims to provide a systematic literature review (SLR) of Scopus-indexed research studies published from 2019 to 2024, focusing on DL-based CV approaches for autonomous UAV applications. By analyzing 173 studies, we categorize the research into four domains: sensing and inspection, landing, surveillance and tracking, and search and rescue. Our review reveals a significant increase in research utilizing computer vision for UAV applications, with over 39.5 % of studies employing the You Only Look Once (YOLO) framework. We discuss the key findings, including the dominant trends, challenges, and opportunities in the field, and highlight emerging technologies such as in-sensor computing. This review provides valuable insights into the current state and future directions of DL-based CV for autonomous UAVs, emphasizing its growing significance as legislative frameworks evolve to support these technologies.

无人驾驶飞行器(UAV)在基础设施检测、包裹递送和娱乐活动等军事和民用领域的应用日益增多,这凸显了增强其自主功能的重要性。人工智能(AI),尤其是基于深度学习的计算机视觉(DL-based CV),在这种增强中发挥着至关重要的作用。本文旨在对 2019 年至 2024 年期间发表的 Scopus 索引研究进行系统性文献综述(SLR),重点关注自主无人机应用中基于 DL 的 CV 方法。通过分析 173 项研究,我们将研究分为四个领域:感知和检测、着陆、监视和跟踪以及搜索和救援。我们的综述显示,利用计算机视觉进行无人机应用的研究大幅增加,超过 39.5% 的研究采用了 "只看一遍"(YOLO)框架。我们讨论了主要发现,包括该领域的主要趋势、挑战和机遇,并重点介绍了传感器内计算等新兴技术。本综述为自主无人机基于 DL 的 CV 的现状和未来发展方向提供了有价值的见解,并强调了随着支持这些技术的立法框架不断发展,其重要性也在不断增加。
{"title":"Autonomous UAV navigation using deep learning-based computer vision frameworks: A systematic literature review","authors":"Aditya Vardhan Reddy Katkuri ,&nbsp;Hakka Madan ,&nbsp;Narendra Khatri ,&nbsp;Antar Shaddad Hamed Abdul-Qawy ,&nbsp;K. Sridhar Patnaik","doi":"10.1016/j.array.2024.100361","DOIUrl":"10.1016/j.array.2024.100361","url":null,"abstract":"<div><p>The increasing use of unmanned aerial vehicles (UAVs) in both military and civilian applications, such as infrastructure inspection, package delivery, and recreational activities, underscores the importance of enhancing their autonomous functionalities. Artificial intelligence (AI), particularly deep learning-based computer vision (DL-based CV), plays a crucial role in this enhancement. This paper aims to provide a systematic literature review (SLR) of Scopus-indexed research studies published from 2019 to 2024, focusing on DL-based CV approaches for autonomous UAV applications. By analyzing 173 studies, we categorize the research into four domains: sensing and inspection, landing, surveillance and tracking, and search and rescue. Our review reveals a significant increase in research utilizing computer vision for UAV applications, with over 39.5 % of studies employing the You Only Look Once (YOLO) framework. We discuss the key findings, including the dominant trends, challenges, and opportunities in the field, and highlight emerging technologies such as in-sensor computing. This review provides valuable insights into the current state and future directions of DL-based CV for autonomous UAVs, emphasizing its growing significance as legislative frameworks evolve to support these technologies.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"23 ","pages":"Article 100361"},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000274/pdfft?md5=49538d0ae336567b2c721a5cb431f7e9&pid=1-s2.0-S2590005624000274-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142151982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat intelligence named entity recognition techniques based on few-shot learning 基于少量学习的威胁情报命名实体识别技术
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100364
Haiyan Wang , Weimin Yang , Wenying Feng , Liyi Zeng , Zhaoquan Gu

In today’s digital and internet era, threat intelligence analysis is of paramount importance to ensure network and information security. Named Entity Recognition (NER) is a fundamental task in natural language processing, aimed at identifying and extracting specific types of named entities from text, such as person names, locations, organization names, dates, times, currencies, and more. The quality of entities determines the effectiveness of upper-layer applications such as knowledge graphs. Recently, there has been a scarcity of training data in the threat intelligence field, and single models suffer from poor generalization ability. To address this, we propose a multi-view learning model, named the Few-shot Threat Intelligence Named Entity Recognition Model (FTM). We enhance the fusion method based on FTM, and further propose the FTM-GRU (Gate Recurrent Unit) model. The FTM model is based on the Tri-training algorithm to collaboratively train three few-shot NER models, leveraging the complementary nature of different model views to enable them to capture more threat intelligence domain knowledge at the coding level.FTM-GRU improves the fusion of multiple views. FTM-GRU uses the improved GRU model structure to control the memory and forgetting of view information, and introduces a relevance calculation unit to avoid redundancy of view information while highlighting important semantic features. We label and construct a few-shot Threat Intelligence Dataset (TID), and experiments on TID as well as the publicly available National Vulnerability Database (NVD) validate the effectiveness of our model for NER in the threat intelligence domain. Experimental results demonstrate that our proposed model achieves better recognition results in the task.

在当今的数字和互联网时代,威胁情报分析对确保网络和信息安全至关重要。命名实体识别(NER)是自然语言处理中的一项基本任务,旨在从文本中识别和提取特定类型的命名实体,如人名、地点、组织名称、日期、时间、货币等。实体的质量决定了知识图谱等上层应用的有效性。最近,威胁情报领域缺乏训练数据,单一模型的泛化能力较差。针对这一问题,我们提出了一种多视角学习模型,命名为 "Few-shot Threat Intelligence Named Entity Recognition Model (FTM)"。我们改进了基于 FTM 的融合方法,并进一步提出了 FTM-GRU(门递归单元)模型。FTM 模型基于 Tri-training 算法,协同训练三个 few-shot NER 模型,利用不同模型视图的互补性,使它们能够在编码层面捕获更多的威胁情报领域知识。FTM-GRU 使用改进的 GRU 模型结构来控制视图信息的记忆和遗忘,并引入相关性计算单元来避免视图信息的冗余,同时突出重要的语义特征。我们标注并构建了一个少量的威胁情报数据集(TID),并在 TID 和公开的国家漏洞数据库(NVD)上进行了实验,验证了我们的模型在威胁情报领域的 NER 中的有效性。实验结果表明,我们提出的模型在任务中取得了更好的识别效果。
{"title":"Threat intelligence named entity recognition techniques based on few-shot learning","authors":"Haiyan Wang ,&nbsp;Weimin Yang ,&nbsp;Wenying Feng ,&nbsp;Liyi Zeng ,&nbsp;Zhaoquan Gu","doi":"10.1016/j.array.2024.100364","DOIUrl":"10.1016/j.array.2024.100364","url":null,"abstract":"<div><p>In today’s digital and internet era, threat intelligence analysis is of paramount importance to ensure network and information security. Named Entity Recognition (NER) is a fundamental task in natural language processing, aimed at identifying and extracting specific types of named entities from text, such as person names, locations, organization names, dates, times, currencies, and more. The quality of entities determines the effectiveness of upper-layer applications such as knowledge graphs. Recently, there has been a scarcity of training data in the threat intelligence field, and single models suffer from poor generalization ability. To address this, we propose a multi-view learning model, named the Few-shot Threat Intelligence Named Entity Recognition Model (FTM). We enhance the fusion method based on FTM, and further propose the FTM-GRU (Gate Recurrent Unit) model. The FTM model is based on the Tri-training algorithm to collaboratively train three few-shot NER models, leveraging the complementary nature of different model views to enable them to capture more threat intelligence domain knowledge at the coding level.FTM-GRU improves the fusion of multiple views. FTM-GRU uses the improved GRU model structure to control the memory and forgetting of view information, and introduces a relevance calculation unit to avoid redundancy of view information while highlighting important semantic features. We label and construct a few-shot Threat Intelligence Dataset (TID), and experiments on TID as well as the publicly available National Vulnerability Database (NVD) validate the effectiveness of our model for NER in the threat intelligence domain. Experimental results demonstrate that our proposed model achieves better recognition results in the task.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"23 ","pages":"Article 100364"},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000304/pdfft?md5=d191f5b484b3734ea988ad3ecd18a1f3&pid=1-s2.0-S2590005624000304-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142168608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reimagining otitis media diagnosis: A fusion of nested U-Net segmentation with graph theory-inspired feature set 重塑中耳炎诊断:嵌套 U-Net 细分与图论启发特征集的融合
IF 2.3 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-01 DOI: 10.1016/j.array.2024.100362
Sami Azam , Md Awlad Hossain Rony , Mohaimenul Azam Khan Raiaan , Kaniz Fatema , Asif Karim , Mirjam Jonkman , Jemima Beissbarth , Amanda Leach , Friso De Boer

Otitis media (OM) is a common infection or inflammation of the middle ear causing conductive hearing loss that primarily affects children and may delay speech, language, and cognitive development. OM can manifest itself in different forms, and can be diagnosed using (video) otoscopy (visualizing the tympanic membrane) or (video) pneumatic otoscopy and tympanometry. Accurate diagnosis of OM is challenging due to subtle differences in otoscopic features. This research aims to develop an automated computer-aided design (CAD) system to assist clinicians in diagnosing OM using otoscopy images. The ground truths, generated manually and validated by otolaryngologists, are utilized to train the proposed nested U-Net++ model. Ten clinically relevant gray level co-occurrence matrix (GLCM) and morphological features were extracted from the segmented Region of Interest (ROI) and validated for OM classification based on a statistical significance test. These features serve as input for a Graph Neural Network (GNN) model, the base model in our research. An optimized GNN model is proposed after ablation study of the base model. Three datasets, one private dataset, and two public ones have been used, where the private dataset is utilized for both training and testing, and the public datasets are used to test the robustness of the proposed GNN model only. The proposed GNN model obtained the highest accuracy in diagnosing OM: 99.38 %, 93.51 %, and 91.38 % for the private dataset, public dataset1, and public dataset2, respectively. The proposed methodology and results of this research might enhance clinicians' effectiveness in diagnosing OM.

中耳炎(OM)是一种常见的中耳感染或炎症,会导致传导性听力损失,主要影响儿童,并可能延迟言语、语言和认知能力的发展。中耳炎的表现形式多种多样,可通过(视频)耳内窥镜检查(观察鼓膜)或(视频)气动耳内窥镜检查和鼓室测量来诊断。由于耳镜特征的细微差别,准确诊断鼓室炎具有挑战性。本研究旨在开发一种自动计算机辅助设计(CAD)系统,以协助临床医生使用耳镜图像诊断耳鸣。利用人工生成并经耳鼻喉科医生验证的基本事实来训练所提出的嵌套 U-Net++ 模型。从分割的感兴趣区(ROI)中提取了十个与临床相关的灰度共现矩阵(GLCM)和形态学特征,并根据统计显著性测试对 OM 分类进行了验证。这些特征作为图神经网络(GNN)模型的输入,是我们研究的基础模型。在对基础模型进行消融研究后,我们提出了一个优化的 GNN 模型。我们使用了三个数据集,一个私有数据集和两个公共数据集,其中私有数据集用于训练和测试,公共数据集仅用于测试所提出的 GNN 模型的鲁棒性。在私人数据集、公共数据集 1 和公共数据集 2 中,所提出的 GNN 模型诊断 OM 的准确率最高:分别为 99.38 %、93.51 % 和 91.38 %。本研究提出的方法和结果可提高临床医生诊断 OM 的效率。
{"title":"Reimagining otitis media diagnosis: A fusion of nested U-Net segmentation with graph theory-inspired feature set","authors":"Sami Azam ,&nbsp;Md Awlad Hossain Rony ,&nbsp;Mohaimenul Azam Khan Raiaan ,&nbsp;Kaniz Fatema ,&nbsp;Asif Karim ,&nbsp;Mirjam Jonkman ,&nbsp;Jemima Beissbarth ,&nbsp;Amanda Leach ,&nbsp;Friso De Boer","doi":"10.1016/j.array.2024.100362","DOIUrl":"10.1016/j.array.2024.100362","url":null,"abstract":"<div><p>Otitis media (OM) is a common infection or inflammation of the middle ear causing conductive hearing loss that primarily affects children and may delay speech, language, and cognitive development. OM can manifest itself in different forms, and can be diagnosed using (video) otoscopy (visualizing the tympanic membrane) or (video) pneumatic otoscopy and tympanometry. Accurate diagnosis of OM is challenging due to subtle differences in otoscopic features. This research aims to develop an automated computer-aided design (CAD) system to assist clinicians in diagnosing OM using otoscopy images. The ground truths, generated manually and validated by otolaryngologists, are utilized to train the proposed nested U-Net++ model. Ten clinically relevant gray level co-occurrence matrix (GLCM) and morphological features were extracted from the segmented Region of Interest (ROI) and validated for OM classification based on a statistical significance test. These features serve as input for a Graph Neural Network (GNN) model, the base model in our research. An optimized GNN model is proposed after ablation study of the base model. Three datasets, one private dataset, and two public ones have been used, where the private dataset is utilized for both training and testing, and the public datasets are used to test the robustness of the proposed GNN model only. The proposed GNN model obtained the highest accuracy in diagnosing OM: 99.38 %, 93.51 %, and 91.38 % for the private dataset, public dataset1, and public dataset2, respectively. The proposed methodology and results of this research might enhance clinicians' effectiveness in diagnosing OM.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"23 ","pages":"Article 100362"},"PeriodicalIF":2.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000286/pdfft?md5=206b3948d729d466a159c76421c4e068&pid=1-s2.0-S2590005624000286-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142171865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Array
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1