首页 > 最新文献

Array最新文献

英文 中文
Detection method of the seat belt for workers at height based on UAV image and YOLO algorithm 基于无人机图像和 YOLO 算法的高空作业人员安全带检测方法
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-03 DOI: 10.1016/j.array.2024.100340
Yuzheng Liu , Jianxun Zhang , Lei Shi , Mingxiang Huang , Linyu Lin , Lingfeng Zhu , Xianglu Lin , Chuanlei Zhang

In the domain of outdoor construction within the power industry, working at significant heights is common, requiring stringent safety measures. Workers are mandated to wear hard hats and secure themselves with seat belts to prevent potential falls, ensuring their safety and reducing the risk of injuries. Detecting seat belt usage holds immense significance in safety inspections within the power industry. This study introduces detection method of the seat belt for workers at height based on UAV Image and YOLO Algorithm. The YOLOv5 approach involves integrating CSPNet into the Darknet53 backbone, incorporating the Focus layer into CSP-Darknet53, replacing the SPPF block in the SPP model, and implementing the CSPNet strategy in the PANet model. Experimental results demonstrate that the YOLOv5 algorithm achieves an elevated average accuracy of 99.2%, surpassing benchmarks set by FastRcnn, SSD, YOLOX-m, and YOLOv7. It also demonstrates superior adaptability in scenarios involving smaller objects, validated using a UAV-collected dataset of seat belt images. These findings confirm the algorithm's compliance with performance criteria for seat belt detection at power construction sites, making a significant contribution to enhancing safety measures within the power industry's construction practices.

在电力行业的户外施工领域,高空作业非常普遍,需要采取严格的安全措施。工人们必须戴上安全帽,并用安全带固定自己,以防止可能发生的坠落,从而确保他们的安全并降低受伤的风险。检测安全带的使用情况对电力行业的安全检查具有重要意义。本研究介绍了基于无人机图像和 YOLO 算法的高空作业人员安全带检测方法。YOLOv5 方法包括将 CSPNet 集成到 Darknet53 骨干网中,将 Focus 层纳入 CSP-Darknet53,替换 SPP 模型中的 SPPF 块,以及在 PANet 模型中实施 CSPNet 策略。实验结果表明,YOLOv5 算法的平均准确率高达 99.2%,超过了 FastRcnn、SSD、YOLOX-m 和 YOLOv7 所设定的基准。 该算法还在涉及较小物体的场景中表现出卓越的适应性,这一点通过使用无人机收集的安全带图像数据集得到了验证。这些发现证实了该算法符合电力施工现场安全带检测的性能标准,为加强电力行业施工实践中的安全措施做出了重大贡献。
{"title":"Detection method of the seat belt for workers at height based on UAV image and YOLO algorithm","authors":"Yuzheng Liu ,&nbsp;Jianxun Zhang ,&nbsp;Lei Shi ,&nbsp;Mingxiang Huang ,&nbsp;Linyu Lin ,&nbsp;Lingfeng Zhu ,&nbsp;Xianglu Lin ,&nbsp;Chuanlei Zhang","doi":"10.1016/j.array.2024.100340","DOIUrl":"https://doi.org/10.1016/j.array.2024.100340","url":null,"abstract":"<div><p>In the domain of outdoor construction within the power industry, working at significant heights is common, requiring stringent safety measures. Workers are mandated to wear hard hats and secure themselves with seat belts to prevent potential falls, ensuring their safety and reducing the risk of injuries. Detecting seat belt usage holds immense significance in safety inspections within the power industry. This study introduces detection method of the seat belt for workers at height based on UAV Image and YOLO Algorithm. The YOLOv5 approach involves integrating CSPNet into the Darknet53 backbone, incorporating the Focus layer into CSP-Darknet53, replacing the SPPF block in the SPP model, and implementing the CSPNet strategy in the PANet model. Experimental results demonstrate that the YOLOv5 algorithm achieves an elevated average accuracy of 99.2%, surpassing benchmarks set by FastRcnn, SSD, YOLOX-m, and YOLOv7. It also demonstrates superior adaptability in scenarios involving smaller objects, validated using a UAV-collected dataset of seat belt images. These findings confirm the algorithm's compliance with performance criteria for seat belt detection at power construction sites, making a significant contribution to enhancing safety measures within the power industry's construction practices.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"22 ","pages":"Article 100340"},"PeriodicalIF":0.0,"publicationDate":"2024-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000067/pdfft?md5=50dec4f4bfbf478e832b65943e75f531&pid=1-s2.0-S2590005624000067-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adoption of ChatGPT by university students for academic purposes: Partial least square, artificial neural network, deep neural network and classification algorithms approach 大学生为学术目的采用 ChatGPT:偏最小二乘法、人工神经网络、深度神经网络和分类算法方法
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-01 DOI: 10.1016/j.array.2024.100339
Arif Mahmud, Afjal Hossan Sarower, Amir Sohel, Md Assaduzzaman, Touhid Bhuiyan

Given the limited extent of study conducted on the application of ChatGPT in the realm of education, this domain still needs to be explored. Consequently, the primary objective of this study is to evaluate the impact of factors within the extended value-based adoption model (VAM) and to delineate the individual contributions of these factors toward shaping the attitudes of university students regarding the utilization of ChatGPT for instructional purposes. This investigation incorporates dimensions such as social influence, self-efficacy, and personal innovativeness to augment the VAM. This augmentation aims to identify components where a hybrid approach, integrating partial least squares (PLS), artificial neural networks (ANN), deep neural networks (DNN), and classification algorithms, is employed to accurately discern both linear and nonlinear correlations. The data for this study were obtained through an online survey administered to university students, and a purposive sample technique was employed to select 369 valid responses. Following the initial data preparation, the assessment process comprised three successive stages: PLS, ANN, DNN and classification algorithms analysis. Intention is influenced by attitude, which is predicted by perceived usefulness, perceived enjoyment, social influence, self-efficacy, and personal innovativeness. Moreover, personal innovativeness has the maximum contribution to attitude followed by self-efficacy, enjoyment, usefulness, social influence, technicality, and cost. These findings will support the creation and prioritization of student-centered educational services. Additionally, this study can contribute to creating an efficient learning management system to enhance students' academic performance and professional efficiency.

鉴于有关 ChatGPT 在教育领域应用的研究有限,这一领域仍有待探索。因此,本研究的主要目的是评估扩展的基于价值的采用模型(VAM)中各因素的影响,并界定这些因素对塑造大学生使用 ChatGPT 教学态度的个体贡献。这项调查纳入了社会影响、自我效能和个人创新性等维度,以增强 VAM。这种增强的目的是确定一些组成部分,在这些组成部分中采用混合方法,将偏最小二乘法 (PLS)、人工神经网络 (ANN)、深度神经网络 (DNN) 和分类算法结合起来,以准确辨别线性和非线性相关性。本研究的数据是通过对大学生进行在线调查获得的,采用目的性抽样技术选出了 369 份有效答卷。在初始数据准备之后,评估过程包括三个连续阶段:PLS、ANN、DNN 和分类算法分析。意向受态度的影响,而态度又受感知有用性、感知乐趣、社会影响、自我效能和个人创新性的预测。此外,个人创新能力对态度的影响最大,其次是自我效能感、享受感、有用性、社会影响、技术性和成本。这些研究结果将有助于创建以学生为中心的教育服务并确定其优先次序。此外,本研究还有助于创建一个高效的学习管理系统,以提高学生的学习成绩和专业效率。
{"title":"Adoption of ChatGPT by university students for academic purposes: Partial least square, artificial neural network, deep neural network and classification algorithms approach","authors":"Arif Mahmud,&nbsp;Afjal Hossan Sarower,&nbsp;Amir Sohel,&nbsp;Md Assaduzzaman,&nbsp;Touhid Bhuiyan","doi":"10.1016/j.array.2024.100339","DOIUrl":"https://doi.org/10.1016/j.array.2024.100339","url":null,"abstract":"<div><p>Given the limited extent of study conducted on the application of ChatGPT in the realm of education, this domain still needs to be explored. Consequently, the primary objective of this study is to evaluate the impact of factors within the extended value-based adoption model (VAM) and to delineate the individual contributions of these factors toward shaping the attitudes of university students regarding the utilization of ChatGPT for instructional purposes. This investigation incorporates dimensions such as social influence, self-efficacy, and personal innovativeness to augment the VAM. This augmentation aims to identify components where a hybrid approach, integrating partial least squares (PLS), artificial neural networks (ANN), deep neural networks (DNN), and classification algorithms, is employed to accurately discern both linear and nonlinear correlations. The data for this study were obtained through an online survey administered to university students, and a purposive sample technique was employed to select 369 valid responses. Following the initial data preparation, the assessment process comprised three successive stages: PLS, ANN, DNN and classification algorithms analysis. Intention is influenced by attitude, which is predicted by perceived usefulness, perceived enjoyment, social influence, self-efficacy, and personal innovativeness. Moreover, personal innovativeness has the maximum contribution to attitude followed by self-efficacy, enjoyment, usefulness, social influence, technicality, and cost. These findings will support the creation and prioritization of student-centered educational services. Additionally, this study can contribute to creating an efficient learning management system to enhance students' academic performance and professional efficiency.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100339"},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000055/pdfft?md5=349b8d60b9358f4b9c5452ad78d09c0d&pid=1-s2.0-S2590005624000055-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140042372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big data security & individual (psychological) resilience: A review of social media risks and lessons learned from Indonesia 大数据安全与个人(心理)复原力:印度尼西亚社交媒体风险与经验教训回顾
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-02-22 DOI: 10.1016/j.array.2024.100336
Abdillah Abdillah , Ida Widianingsih , Rd Ahmad Buchari , Heru Nurasa

This research aims to reduce social media security risks and develop best practices to help governments address social media security risks more effectively. This research begins by reviewing the different discussions in the literature about social media security risks and mitigation techniques. Based on the extensive review, several key insights were identified and summarized to help organizations address social media security risks more effectively. Many national governments around the world do not have effective social media security policies and are unsure how to develop effective social media security strategies to mitigate social media security risks. This research provides guidance to national governments on mitigating potential social media security risks. This study incorporates ongoing debates in the literature and provides guidance on how to reduce social media security and technological risks. Practical insights are identified and summarized from the extensive literature. More discussions and studies are needed on strategies and practical insights to reduce social media risk for the Indonesian government.

本研究旨在降低社交媒体安全风险,制定最佳实践,帮助政府更有效地应对社交媒体安全风险。本研究首先回顾了文献中关于社交媒体安全风险和缓解技术的不同讨论。在广泛查阅的基础上,确定并总结了几个关键见解,以帮助各组织更有效地应对社交媒体安全风险。世界上许多国家的政府都没有有效的社交媒体安全政策,也不知道如何制定有效的社交媒体安全战略来降低社交媒体安全风险。本研究为各国政府降低潜在的社交媒体安全风险提供了指导。本研究纳入了文献中正在进行的辩论,并就如何降低社交媒体安全和技术风险提供了指导。从大量文献中发现并总结了实用的见解。还需要对印尼政府降低社交媒体风险的策略和实用见解进行更多的讨论和研究。
{"title":"Big data security & individual (psychological) resilience: A review of social media risks and lessons learned from Indonesia","authors":"Abdillah Abdillah ,&nbsp;Ida Widianingsih ,&nbsp;Rd Ahmad Buchari ,&nbsp;Heru Nurasa","doi":"10.1016/j.array.2024.100336","DOIUrl":"https://doi.org/10.1016/j.array.2024.100336","url":null,"abstract":"<div><p>This research aims to reduce social media security risks and develop best practices to help governments address social media security risks more effectively. This research begins by reviewing the different discussions in the literature about social media security risks and mitigation techniques. Based on the extensive review, several key insights were identified and summarized to help organizations address social media security risks more effectively. Many national governments around the world do not have effective social media security policies and are unsure how to develop effective social media security strategies to mitigate social media security risks. This research provides guidance to national governments on mitigating potential social media security risks. This study incorporates ongoing debates in the literature and provides guidance on how to reduce social media security and technological risks. Practical insights are identified and summarized from the extensive literature. More discussions and studies are needed on strategies and practical insights to reduce social media risk for the Indonesian government.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100336"},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S259000562400002X/pdfft?md5=ba831e3d2d41e5a91bcf0ce7cc29aec7&pid=1-s2.0-S259000562400002X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139936136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An encrypted traffic identification method based on multi-scale feature fusion 基于多尺度特征融合的加密流量识别方法
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-02-22 DOI: 10.1016/j.array.2024.100338
Peng Zhu , Gang Wang , Jingheng He , Yueli Dong , Yu Chang

As data privacy issues become more and more sensitive, increasing numbers of websites usually encrypt traffic when transmitting it. This method can largely protect privacy, but it also brings a huge challenge. Aiming at the problem that encrypted traffic classification makes it difficult to obtain a global optimal solution, this paper proposes an encrypted traffic identification model called the ET-BERT and 1D-CNN fusion network (BCFNet), based on multi-scale feature fusion. This method combines feature learning with classification tasks, unified into an end-to-end model. The local features of encrypted traffic extracted based on the improved Inception one-dimensional convolutional neural network structure are fused with the global features extracted by the ET-BERT model. The one-dimensional convolutional neural network is more suitable for the encrypted traffic of a one-dimensional sequence than the commonly used two-dimensional convolutional neural network. The proposed model can learn the nonlinear relationship between the input data and the expected label and obtain the global optimal solution with a greater probability. This paper verifies the ISCX VPN-nonVPN dataset and compares the results of the BCFNet model with the other five baseline models on accuracy, precision, recall, and F1 indicators. The experimental results demonstrate that the BCFNet model has a greater overall effect than the other five models. Its accuracy can reach 98.88%.

随着数据隐私问题变得越来越敏感,越来越多的网站通常会在传输流量时进行加密。这种方法能在很大程度上保护隐私,但也带来了巨大的挑战。针对加密流量分类难以获得全局最优解的问题,本文提出了一种基于多尺度特征融合的加密流量识别模型--ET-BERT 和 1D-CNN 融合网络(BCFNet)。该方法将特征学习与分类任务相结合,统一为端到端模型。基于改进的 Inception 一维卷积神经网络结构提取的加密流量局部特征与 ET-BERT 模型提取的全局特征相融合。与常用的二维卷积神经网络相比,一维卷积神经网络更适用于一维序列的加密流量。所提出的模型可以学习输入数据与预期标签之间的非线性关系,并以更大的概率获得全局最优解。本文验证了 ISCX VPN-nonVPN 数据集,并比较了 BCFNet 模型与其他五个基线模型在准确率、精确度、召回率和 F1 指标上的结果。实验结果表明,BCFNet 模型的整体效果优于其他五个模型。其准确率可达 98.88%。
{"title":"An encrypted traffic identification method based on multi-scale feature fusion","authors":"Peng Zhu ,&nbsp;Gang Wang ,&nbsp;Jingheng He ,&nbsp;Yueli Dong ,&nbsp;Yu Chang","doi":"10.1016/j.array.2024.100338","DOIUrl":"https://doi.org/10.1016/j.array.2024.100338","url":null,"abstract":"<div><p>As data privacy issues become more and more sensitive, increasing numbers of websites usually encrypt traffic when transmitting it. This method can largely protect privacy, but it also brings a huge challenge. Aiming at the problem that encrypted traffic classification makes it difficult to obtain a global optimal solution, this paper proposes an encrypted traffic identification model called the ET-BERT and 1D-CNN fusion network (BCFNet), based on multi-scale feature fusion. This method combines feature learning with classification tasks, unified into an end-to-end model. The local features of encrypted traffic extracted based on the improved Inception one-dimensional convolutional neural network structure are fused with the global features extracted by the ET-BERT model. The one-dimensional convolutional neural network is more suitable for the encrypted traffic of a one-dimensional sequence than the commonly used two-dimensional convolutional neural network. The proposed model can learn the nonlinear relationship between the input data and the expected label and obtain the global optimal solution with a greater probability. This paper verifies the ISCX VPN-nonVPN dataset and compares the results of the BCFNet model with the other five baseline models on accuracy, precision, recall, and F1 indicators. The experimental results demonstrate that the BCFNet model has a greater overall effect than the other five models. <em>Its accuracy can reach 98.88%.</em></p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100338"},"PeriodicalIF":0.0,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000043/pdfft?md5=9bdc10d2ece62e4a288fe5d295082936&pid=1-s2.0-S2590005624000043-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139985551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FPGA-based ML adaptive accelerator: A partial reconfiguration approach for optimized ML accelerator utilization 基于 FPGA 的 ML 自适应加速器:优化 ML 加速器利用率的部分重新配置方法
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-02-17 DOI: 10.1016/j.array.2024.100337
Achraf El Bouazzaoui, Abdelkader Hadjoudja, Omar Mouhib, Nazha Cherkaoui

The relentless increase in data volume and complexity necessitates advancements in machine learning methodologies that are more adaptable. In response to this challenge, we present a novel architecture enabling dynamic classifier selection on FPGA platforms. This unique architecture combines hardware accelerators of three distinct classifiers—Support Vector Machines, K-Nearest Neighbors, and Deep Neural Networks—without requiring the combined area footprint of those implementations. It further introduces a hardware-based Accelerator Selector that dynamically selects the most fitting classifier for incoming data based on the K-Nearest Centroid approach. When tested on four different datasets, Our architecture demonstrated improved classification performance, with an accuracy enhancement of up to 8% compared to the software implementations. Besides this enhanced accuracy, it achieved a significant reduction in resource usage, with a decrease of up to 45% compared to a static implementation making it highly efficient in terms of resource utilization and energy consumption on FPGA platforms, paving the way for scalable ML applications. To the best of our knowledge, this work is the first to harness FPGA platforms for dynamic classifier selection.

数据量和复杂性的不断增加要求机器学习方法具有更强的适应性。为了应对这一挑战,我们提出了一种新型架构,可在 FPGA 平台上实现动态分类器选择。这种独特的架构将支持向量机、K-近邻和深度神经网络这三种不同分类器的硬件加速器结合在一起,而不需要这些实现的总面积。它还引入了基于硬件的加速器选择器,可根据 K-Nearest Centroid 方法为输入数据动态选择最合适的分类器。在四个不同的数据集上进行测试时,我们的架构显示出更高的分类性能,与软件实现相比,准确率提高了 8%。除了准确率提高之外,它还显著降低了资源使用率,与静态实现相比降低了 45%,使其在 FPGA 平台上的资源利用率和能耗方面非常高效,为可扩展的 ML 应用铺平了道路。据我们所知,这项工作是首次利用 FPGA 平台进行动态分类器选择。
{"title":"FPGA-based ML adaptive accelerator: A partial reconfiguration approach for optimized ML accelerator utilization","authors":"Achraf El Bouazzaoui,&nbsp;Abdelkader Hadjoudja,&nbsp;Omar Mouhib,&nbsp;Nazha Cherkaoui","doi":"10.1016/j.array.2024.100337","DOIUrl":"https://doi.org/10.1016/j.array.2024.100337","url":null,"abstract":"<div><p>The relentless increase in data volume and complexity necessitates advancements in machine learning methodologies that are more adaptable. In response to this challenge, we present a novel architecture enabling dynamic classifier selection on FPGA platforms. This unique architecture combines hardware accelerators of three distinct classifiers—Support Vector Machines, K-Nearest Neighbors, and Deep Neural Networks—without requiring the combined area footprint of those implementations. It further introduces a hardware-based Accelerator Selector that dynamically selects the most fitting classifier for incoming data based on the K-Nearest Centroid approach. When tested on four different datasets, Our architecture demonstrated improved classification performance, with an accuracy enhancement of up to 8% compared to the software implementations. Besides this enhanced accuracy, it achieved a significant reduction in resource usage, with a decrease of up to 45% compared to a static implementation making it highly efficient in terms of resource utilization and energy consumption on FPGA platforms, paving the way for scalable ML applications. To the best of our knowledge, this work is the first to harness FPGA platforms for dynamic classifier selection.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100337"},"PeriodicalIF":0.0,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000031/pdfft?md5=95f2138b6f79f83ca28d5588ddf2edda&pid=1-s2.0-S2590005624000031-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139901212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robustness and user test on text-based CAPTCHA: Letter segmenting is not too easy or too hard 基于文本的验证码的稳健性和用户测试:字母分割不难也不易
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-04 DOI: 10.1016/j.array.2024.100335
Maneerut Chatrangsan , Chatpong Tangmanee

Text-based CAPTCHA is widely used as an online security guard, requiring a user to input letters for classifying human and automated software (known as a bot). However, they are still a problem for usability and robustness. This study investigated the effect of letter spacing, disturbing line orientation and disturbing line color on user test and robustness of text-based CAPTCHA. The 240 CAPTCHAS were tested using Thai undergraduate students. The results show that there were no significant differences in user tests for the three factors. For robustness, disturbing line orientation had no significant difference. However, overlapping letter CAPTCHA was the most significantly robust. CAPTCHA with a disturbing line using the same color as the background was more significantly robust than that using the same color as the foreground. Moreover, if no-spacing letter is used, the effect of disturbing line color is statistically significant in robustness while the effect of that became insignificant when a spacing between letter and overlapping letter are used. We recommend that CAPTCHA with no spacing letter and combined with disturbing line using the same color as the background is suitable for users and its robustness. This can be concluded that letter segmenting technique is not too hard for users (passed 88 %) while it is not too easy for bot attacks (passed 39 %). In terms of security, more studies can still be carried on the CAPTCHA to enabled more robustness against new crime technologies. In terms of usability, on other age groups could be consider.

基于文本的验证码被广泛用作在线安全卫士,要求用户输入字母,以便对人类和自动软件(称为机器人)进行分类。然而,它们在可用性和稳健性方面仍存在问题。本研究调查了字母间距、干扰线方向和干扰线颜色对用户测试和基于文本的验证码稳健性的影响。泰国大学生对 240 个验证码进行了测试。结果显示,这三个因素在用户测试中没有明显差异。在稳健性方面,干扰线方向没有明显差异。然而,字母重叠验证码的稳健性最为明显。使用与背景相同颜色的干扰线的验证码比使用与前景相同颜色的验证码具有更明显的稳健性。此外,如果使用无间距字母,干扰线颜色对稳健性的影响在统计上是显著的,而当使用字母间距和字母重叠时,干扰线颜色对稳健性的影响变得不显著。我们建议,不使用字母间距并结合使用与背景相同颜色的干扰线的验证码适用于用户,并且具有稳健性。由此可以得出结论,字母分割技术对用户来说并不难(通过率为 88%),而对僵尸攻击来说并不容易(通过率为 39%)。在安全性方面,还可以对验证码进行更多的研究,以增强其抵御新犯罪技术的能力。在可用性方面,可以考虑其他年龄段的用户。
{"title":"Robustness and user test on text-based CAPTCHA: Letter segmenting is not too easy or too hard","authors":"Maneerut Chatrangsan ,&nbsp;Chatpong Tangmanee","doi":"10.1016/j.array.2024.100335","DOIUrl":"https://doi.org/10.1016/j.array.2024.100335","url":null,"abstract":"<div><p>Text-based CAPTCHA is widely used as an online security guard, requiring a user to input letters for classifying human and automated software (known as a bot). However, they are still a problem for usability and robustness. This study investigated the effect of letter spacing, disturbing line orientation and disturbing line color on user test and robustness of text-based CAPTCHA. The 240 CAPTCHAS were tested using Thai undergraduate students. The results show that there were no significant differences in user tests for the three factors. For robustness, disturbing line orientation had no significant difference. However, overlapping letter CAPTCHA was the most significantly robust. CAPTCHA with a disturbing line using the same color as the background was more significantly robust than that using the same color as the foreground. Moreover, if no-spacing letter is used, the effect of disturbing line color is statistically significant in robustness while the effect of that became insignificant when a spacing between letter and overlapping letter are used. We recommend that CAPTCHA with no spacing letter and combined with disturbing line using the same color as the background is suitable for users and its robustness. This can be concluded that letter segmenting technique is not too hard for users (passed 88 %) while it is not too easy for bot attacks (passed 39 %). In terms of security, more studies can still be carried on the CAPTCHA to enabled more robustness against new crime technologies. In terms of usability, on other age groups could be consider.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100335"},"PeriodicalIF":0.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005624000018/pdfft?md5=46ee351b0b9dc5c07b463a6fa4514913&pid=1-s2.0-S2590005624000018-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139111808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Triplet extraction leveraging sentence transformers and dependency parsing 利用句子变换器和依赖关系解析进行三重提取
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-12-27 DOI: 10.1016/j.array.2023.100334
Stuart Gallina Ottersen, Flávio Pinheiro, Fernando Bação

Knowledge Graphs are a tool to structure (entity, relation, entity) triples. One possible way to construct these knowledge graphs is by extracting triples from unstructured text. The aim when doing this is to maximise the number of useful triples while minimising the triples containing no or useless information. Most previous work in this field uses supervised learning techniques that can be expensive both computationally and in that they require labelled data. While the existing unsupervised methods often produce an excessive amount of triples with low value, base themselves on empirical rules when extracting triples or struggle with the order of the entities relative to the relation. To address these issues this paper suggests a new model: Unsupervised Dependency parsing Aided Semantic Triple Extraction (UDASTE) that leverages sentence structure and allows defining restrictive triple relation types to generate high-quality triples while removing the need for mapping extracted triples to relation schemas. This is done by leveraging pre-trained language models. UDASTE is compared with two baseline models on three datasets. UDASTE outperforms the baselines on all three datasets. Its limitations and possible further work are discussed in addition to the implementation of the model in a computational intelligence context.

知识图谱是一种结构化(实体、关系、实体)三元组的工具。构建这些知识图谱的一种可行方法是从非结构化文本中提取三元组。这样做的目的是最大限度地增加有用三元组的数量,同时尽量减少不含信息或无用信息的三元组。该领域的大部分前人工作都使用了监督学习技术,这种技术不仅计算成本高,而且需要标注数据。而现有的无监督方法往往会产生过量的低价值三元组,在提取三元组时会依据经验规则,或者在实体与关系的顺序方面存在困难。为了解决这些问题,本文提出了一种新的模型:无监督依赖解析辅助语义三元提取(UDASTE)利用句子结构,允许定义限制性三元关系类型来生成高质量的三元,同时无需将提取的三元映射到关系模式。这是通过利用预训练的语言模型实现的。UDASTE 在三个数据集上与两个基准模型进行了比较。在所有三个数据集上,UDASTE 的表现都优于基线模型。除了在计算智能背景下实施该模型外,还讨论了其局限性和可能的进一步工作。
{"title":"Triplet extraction leveraging sentence transformers and dependency parsing","authors":"Stuart Gallina Ottersen,&nbsp;Flávio Pinheiro,&nbsp;Fernando Bação","doi":"10.1016/j.array.2023.100334","DOIUrl":"https://doi.org/10.1016/j.array.2023.100334","url":null,"abstract":"<div><p>Knowledge Graphs are a tool to structure (entity, relation, entity) triples. One possible way to construct these knowledge graphs is by extracting triples from unstructured text. The aim when doing this is to maximise the number of useful triples while minimising the triples containing no or useless information. Most previous work in this field uses supervised learning techniques that can be expensive both computationally and in that they require labelled data. While the existing unsupervised methods often produce an excessive amount of triples with low value, base themselves on empirical rules when extracting triples or struggle with the order of the entities relative to the relation. To address these issues this paper suggests a new model: Unsupervised Dependency parsing Aided Semantic Triple Extraction (<em>UDASTE</em>) that leverages sentence structure and allows defining restrictive triple relation types to generate high-quality triples while removing the need for mapping extracted triples to relation schemas. This is done by leveraging pre-trained language models. <em>UDASTE</em> is compared with two baseline models on three datasets. <em>UDASTE</em> outperforms the baselines on all three datasets. Its limitations and possible further work are discussed in addition to the implementation of the model in a computational intelligence context.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100334"},"PeriodicalIF":0.0,"publicationDate":"2023-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005623000590/pdfft?md5=4d42cb559e16ed40cf0fee56cb903290&pid=1-s2.0-S2590005623000590-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139100961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining a multi-feature neural network with multi-task learning for emergency calls severity prediction 将多特征神经网络与多任务学习相结合,用于紧急呼叫严重性预测
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-12-19 DOI: 10.1016/j.array.2023.100333
Marianne Abi Kanaan , Jean-François Couchot , Christophe Guyeux , David Laiymani , Talar Atechian , Rony Darazi

In emergency call centers, operators are required to analyze and prioritize emergency situations prior to any intervention. This allows the team to deploy resources efficiently if needed, and thereby provide the optimal assistance to the victims. The automation of such an analysis remains challenging, given the unpredictable nature of the calls. Therefore, in this study, we describe our attempt in improving an emergency calls processing system’s accuracy in the classification of an emergency’s severity, based on transcriptions of the caller’s speech. Specifically, we first extend the baseline classifier to include additional feature extractors of different modalities of data. These features include detected emotions, time-based features, and the victim’s personal information. Second, we experiment with a multi-task learning approach, in which we attempt to detect the nature of the emergency on the one hand, and improve the severity classification score on the other hand. Additional improvements include the use of a larger dataset and an explainability study of the classifier’s decision-making process. Our best model was able to predict 833 emergency calls’ severity with a 71.27% accuracy, a 5.33% improvement over the baseline model. Moreover, we extended our tool with additional modules that can prove to be useful when handling emergency calls.

在紧急呼叫中心,操作员需要在采取任何干预措施之前对紧急情况进行分析并确定优先次序。这样,团队就能在需要时有效地调配资源,从而为受害者提供最佳援助。鉴于呼叫的不可预测性,这种分析的自动化仍具有挑战性。因此,在本研究中,我们将介绍如何根据来电者的语音转录,提高紧急呼叫处理系统对紧急情况严重程度进行分类的准确性。具体来说,我们首先扩展了基线分类器,增加了不同数据模式的特征提取器。这些特征包括检测到的情绪、基于时间的特征和受害者的个人信息。其次,我们尝试使用多任务学习方法,一方面检测紧急情况的性质,另一方面提高严重程度分类得分。其他改进还包括使用更大的数据集以及对分类器决策过程的可解释性研究。我们的最佳模型能够预测 833 个紧急呼叫的严重程度,准确率为 71.27%,比基准模型提高了 5.33%。此外,我们还对工具进行了扩展,增加了在处理紧急呼叫时可能有用的模块。
{"title":"Combining a multi-feature neural network with multi-task learning for emergency calls severity prediction","authors":"Marianne Abi Kanaan ,&nbsp;Jean-François Couchot ,&nbsp;Christophe Guyeux ,&nbsp;David Laiymani ,&nbsp;Talar Atechian ,&nbsp;Rony Darazi","doi":"10.1016/j.array.2023.100333","DOIUrl":"10.1016/j.array.2023.100333","url":null,"abstract":"<div><p>In emergency call centers, operators are required to analyze and prioritize emergency situations prior to any intervention. This allows the team to deploy resources efficiently if needed, and thereby provide the optimal assistance to the victims. The automation of such an analysis remains challenging, given the unpredictable nature of the calls. Therefore, in this study, we describe our attempt in improving an emergency calls processing system’s accuracy in the classification of an emergency’s severity, based on transcriptions of the caller’s speech. Specifically, we first extend the baseline classifier to include additional feature extractors of different modalities of data. These features include detected emotions, time-based features, and the victim’s personal information. Second, we experiment with a multi-task learning approach, in which we attempt to detect the nature of the emergency on the one hand, and improve the severity classification score on the other hand. Additional improvements include the use of a larger dataset and an explainability study of the classifier’s decision-making process. Our best model was able to predict 833 emergency calls’ severity with a 71.27% accuracy, a 5.33% improvement over the baseline model. Moreover, we extended our tool with additional modules that can prove to be useful when handling emergency calls.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100333"},"PeriodicalIF":0.0,"publicationDate":"2023-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005623000589/pdfft?md5=2d223cfef124a38eb074b282afcf31c6&pid=1-s2.0-S2590005623000589-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139016983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APIE: An information extraction module designed based on the pipeline method api:基于流水线方法设计的信息抽取模块
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-12-01 DOI: 10.1016/j.array.2023.100331
Xu Jiang , Yurong Cheng , Siyi Zhang , Juan Wang , Baoquan Ma

Information extraction (IE) aims to discover and extract valuable information from unstructured text. This problem can be decomposed into two subtasks: named entity recognition (NER) and relation extraction (RE). Although the IE problem has been studied for years, most work efforts focused on jointly modeling these two subtasks, either by casting them into a structured prediction framework or by performing multitask learning through shared representations. However, since the contextual representations of entity and relation models inherently capture different feature information, sharing a single encoder to capture the information required by both subtasks in the same space would harm the accuracy of the model. Recent research (Zhong and Chen, 2020) has also proved that using two separate encoders for NER and RE tasks respectively through pipeline method are effective, with the model surpassing all previous joint models in accuracy. Thus, in this paper, we design An Pipeline method Information Extraction module called APIE, APIE combines the advantages of both pipeline methods and joint methods, demonstrating higher accuracy and powerful reasoning abilities. Specifically, we design a multi-level feature NER model based on attention mechanism and a document-level RE model based on local context pooling. To demonstrate the effectiveness of our proposed approach, we conducted tests on multiple datasets. Extensive experimental results have shown that our proposed model outperforms state-of-the-art methods and improves both accuracy and reasoning abilities.

信息抽取(Information extraction, IE)旨在从非结构化文本中发现和提取有价值的信息。该问题可以分解为两个子任务:命名实体识别(NER)和关系提取(RE)。尽管IE问题已经研究多年,但大多数工作都集中在联合建模这两个子任务上,要么将它们投射到一个结构化的预测框架中,要么通过共享表示执行多任务学习。然而,由于实体模型和关系模型的上下文表示本质上捕获不同的特征信息,共享一个编码器来捕获同一空间中两个子任务所需的信息将损害模型的准确性。最近的研究(Zhong and Chen, 2020)也证明了通过管道方法分别为NER和RE任务使用两个单独的编码器是有效的,该模型在精度上超过了之前所有的联合模型。因此,本文设计了一个管道方法信息提取模块APIE, APIE结合了管道方法和联合方法的优点,具有更高的准确性和强大的推理能力。具体来说,我们设计了一个基于注意机制的多层次特征NER模型和一个基于局部上下文池的文档级RE模型。为了证明我们提出的方法的有效性,我们在多个数据集上进行了测试。大量的实验结果表明,我们提出的模型优于最先进的方法,并提高了准确性和推理能力。
{"title":"APIE: An information extraction module designed based on the pipeline method","authors":"Xu Jiang ,&nbsp;Yurong Cheng ,&nbsp;Siyi Zhang ,&nbsp;Juan Wang ,&nbsp;Baoquan Ma","doi":"10.1016/j.array.2023.100331","DOIUrl":"https://doi.org/10.1016/j.array.2023.100331","url":null,"abstract":"<div><p>Information extraction (IE) aims to discover and extract valuable information from unstructured text. This problem can be decomposed into two subtasks: named entity recognition (NER) and relation extraction (RE). Although the IE problem has been studied for years, most work efforts focused on jointly modeling these two subtasks, either by casting them into a structured prediction framework or by performing multitask learning through shared representations. However, since the contextual representations of entity and relation models inherently capture different feature information, sharing a single encoder to capture the information required by both subtasks in the same space would harm the accuracy of the model. Recent research (Zhong and Chen, 2020) has also proved that using two separate encoders for NER and RE tasks respectively through pipeline method are effective, with the model surpassing all previous joint models in accuracy. Thus, in this paper, we design <strong>A</strong>n <strong>P</strong>ipeline method <strong>I</strong>nformation <strong>E</strong>xtraction module called <strong>APIE</strong>, APIE combines the advantages of both pipeline methods and joint methods, demonstrating higher accuracy and powerful reasoning abilities. Specifically, we design a multi-level feature NER model based on attention mechanism and a document-level RE model based on local context pooling. To demonstrate the effectiveness of our proposed approach, we conducted tests on multiple datasets. Extensive experimental results have shown that our proposed model outperforms state-of-the-art methods and improves both accuracy and reasoning abilities.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100331"},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005623000565/pdfft?md5=1f053c973dea03b6b99efcb063a40e93&pid=1-s2.0-S2590005623000565-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138501687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive analysis of feature ranking-based fish disease recognition 基于特征排序的鱼病识别综合分析
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-12-01 DOI: 10.1016/j.array.2023.100329
Aditya Rajbongshi , Rashiduzzaman Shakil , Bonna Akter , Munira Akter Lata , Md. Mahbubul Alam Joarder

In recent years, the field of emerging computer vision systems has witnessed significant advancements in automated disease diagnosis through the utilization of vision-oriented technology. This article proposes an optimal approach for detecting the presence of ailments in Rohu fish. The aims of our research is to identify the most significant features based on Analysis of Variance (ANOVA) feature selection and evaluate the best performance among all features for Rohu fish disease recognition. At the outset, diverse techniques for image preprocessing were employed on the acquired images. The region affected by the disease was partitioned through utilization of the K-means clustering algorithm. Subsequently, 10 distinct statistical and Gray-Level Co-occurrence Matrix (GLCM) features were extracted after the image segmentation. The ANOVA feature selection technique was employed to prioritize the most significant features N (where 5 N 10) from the pool of 10 categories. The Synthetic Minority Oversampling Technique, often known as SMOTE, was applied to solve class imbalance problem. After conducting training and testing on nine different machine learning (ML) classifiers, an evaluation was performed to estimate the performance of each classifier using eight various performance metrics. Additionally, a receiver operating characteristic (ROC) curve was generated. The classifier that utilized the Enable Hist Gradient Boosting algorithm and selected the top 9 features demonstrated superior performance compared to the other eight models, achieving the highest accuracy rate of 88.81%. In conclusion, we have demonstrated that the feature selection process reduces the computational cost.

近年来,新兴计算机视觉系统领域通过利用视觉导向技术,在自动疾病诊断方面取得了重大进展。本文提出了一种检测罗汉鱼是否患病的最佳方法。我们的研究目的是基于方差分析(ANOVA)特征选择找出最重要的特征,并评估所有特征中用于识别罗汉鱼疾病的最佳性能。首先,对获取的图像采用了多种图像预处理技术。通过使用 K-means 聚类算法划分受疾病影响的区域。随后,在图像分割后提取了 10 个不同的统计和灰度共现矩阵(GLCM)特征。采用方差分析特征选择技术,从 10 个类别中优先选择最重要的特征 N(其中 5 ≤ N ≤ 10)。合成少数群体过度采样技术(通常称为 SMOTE)被用于解决类不平衡问题。在对九种不同的机器学习(ML)分类器进行训练和测试后,使用八种不同的性能指标对每种分类器的性能进行了评估。此外,还生成了接收者操作特征曲线(ROC)。与其他 8 个模型相比,使用 Enable Hist 梯度提升算法并选择前 9 个特征的分类器表现出色,准确率最高,达到 88.81%。总之,我们证明了特征选择过程可以降低计算成本。
{"title":"A comprehensive analysis of feature ranking-based fish disease recognition","authors":"Aditya Rajbongshi ,&nbsp;Rashiduzzaman Shakil ,&nbsp;Bonna Akter ,&nbsp;Munira Akter Lata ,&nbsp;Md. Mahbubul Alam Joarder","doi":"10.1016/j.array.2023.100329","DOIUrl":"https://doi.org/10.1016/j.array.2023.100329","url":null,"abstract":"<div><p>In recent years, the field of emerging computer vision systems has witnessed significant advancements in automated disease diagnosis through the utilization of vision-oriented technology. This article proposes an optimal approach for detecting the presence of ailments in Rohu fish. The aims of our research is to identify the most significant features based on Analysis of Variance (ANOVA) feature selection and evaluate the best performance among all features for Rohu fish disease recognition. At the outset, diverse techniques for image preprocessing were employed on the acquired images. The region affected by the disease was partitioned through utilization of the K-means clustering algorithm. Subsequently, 10 distinct statistical and Gray-Level Co-occurrence Matrix (GLCM) features were extracted after the image segmentation. The ANOVA feature selection technique was employed to prioritize the most significant features N (where 5 <span><math><mo>≤</mo></math></span> N <span><math><mo>≤</mo></math></span> 10) from the pool of 10 categories. The Synthetic Minority Oversampling Technique, often known as SMOTE, was applied to solve class imbalance problem. After conducting training and testing on nine different machine learning (ML) classifiers, an evaluation was performed to estimate the performance of each classifier using eight various performance metrics. Additionally, a receiver operating characteristic (ROC) curve was generated. The classifier that utilized the Enable Hist Gradient Boosting algorithm and selected the top 9 features demonstrated superior performance compared to the other eight models, achieving the highest accuracy rate of 88.81%. In conclusion, we have demonstrated that the feature selection process reduces the computational cost.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"21 ","pages":"Article 100329"},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005623000541/pdfft?md5=76f0417dbf9f956f909e5d5cc71ad2ca&pid=1-s2.0-S2590005623000541-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138557253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Array
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1