首页 > 最新文献

Internet of Things and Cyber-Physical Systems最新文献

英文 中文
Data management method for building internet of things based on blockchain sharding and DAG 基于区块链分片和 DAG 构建物联网的数据管理方法
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.01.001
Wenhu Zheng, Xu Wang, Zhenxi Xie, Yixin Li, Xiaoyun Ye, Jinlong Wang, Xiaoyun Xiong

Sharding technology can address the throughput and scalability limitations that arise when single-chain blockchain are applied in the Internet of Things (IoT). However, existing sharding solutions focus on addressing issues like malicious nodes clustering and cross-shard transactions. Existing sharding solutions cannot adapt to the performance disparities of edge nodes and the characteristic of three-dimensional data queries in building IoT. This leads to problems such as shard overheating and inefficient data query efficiency. This paper proposes a dual-layer architecture called S-DAG, which combines sharded blockchain and DAG blockchain. The sharded blockchain processes transactions within the building IoT, while the DAG blockchain stores block headers from the sharded network. By designing an Adaptive Balancing Load Algorithm (ABLA) for periodic network sharding, nodes are divided based on their load performance values to prevent the aggregation of low-load performance nodes and the resulting issue of shard overheating. By combining the characteristics of the KD tree and Merkle tree, a block structure known as 3D-Merkle tree is designed to support three-dimensional data queries, enhancing the efficiency of three-dimensional data queries in building IoT. By deploying and conducting simulation experiments on various physical devices, we have verified the effectiveness of the solution proposed in this paper. The results indicate that, compared to other solutions, the proposed solution is better suited for building IoT data management. ABLA is effective in preventing shard overheating issue, and the 3D-Merkle tree significantly enhances data query efficiency.

在物联网(IoT)中应用单链区块链时,分片技术可以解决吞吐量和可扩展性方面的限制。然而,现有的分片解决方案侧重于解决恶意节点集群和跨分片交易等问题。现有的分片解决方案无法适应边缘节点的性能差异和构建物联网中三维数据查询的特点。这导致了分片过热和数据查询效率低下等问题。本文提出了一种名为 S-DAG 的双层架构,它结合了分片区块链和 DAG 区块链。分片区块链处理建筑物联网内的交易,而 DAG 区块链存储来自分片网络的区块头。通过为周期性网络分片设计自适应平衡负载算法(ABLA),根据节点的负载性能值对节点进行划分,以防止低负载性能节点的聚集和由此导致的分片过热问题。结合KD树和Merkle树的特点,设计了一种支持三维数据查询的块结构,即3D-Merkle树,提高了楼宇物联网中三维数据查询的效率。通过在各种物理设备上进行部署和模拟实验,我们验证了本文提出的解决方案的有效性。结果表明,与其他解决方案相比,本文提出的解决方案更适合楼宇物联网数据管理。ABLA 能有效防止碎片过热问题,3D-Merkle 树能显著提高数据查询效率。
{"title":"Data management method for building internet of things based on blockchain sharding and DAG","authors":"Wenhu Zheng,&nbsp;Xu Wang,&nbsp;Zhenxi Xie,&nbsp;Yixin Li,&nbsp;Xiaoyun Ye,&nbsp;Jinlong Wang,&nbsp;Xiaoyun Xiong","doi":"10.1016/j.iotcps.2024.01.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.01.001","url":null,"abstract":"<div><p>Sharding technology can address the throughput and scalability limitations that arise when single-chain blockchain are applied in the Internet of Things (IoT). However, existing sharding solutions focus on addressing issues like malicious nodes clustering and cross-shard transactions. Existing sharding solutions cannot adapt to the performance disparities of edge nodes and the characteristic of three-dimensional data queries in building IoT. This leads to problems such as shard overheating and inefficient data query efficiency. This paper proposes a dual-layer architecture called S-DAG, which combines sharded blockchain and DAG blockchain. The sharded blockchain processes transactions within the building IoT, while the DAG blockchain stores block headers from the sharded network. By designing an Adaptive Balancing Load Algorithm (ABLA) for periodic network sharding, nodes are divided based on their load performance values to prevent the aggregation of low-load performance nodes and the resulting issue of shard overheating. By combining the characteristics of the KD tree and Merkle tree, a block structure known as 3D-Merkle tree is designed to support three-dimensional data queries, enhancing the efficiency of three-dimensional data queries in building IoT. By deploying and conducting simulation experiments on various physical devices, we have verified the effectiveness of the solution proposed in this paper. The results indicate that, compared to other solutions, the proposed solution is better suited for building IoT data management. ABLA is effective in preventing shard overheating issue, and the 3D-Merkle tree significantly enhances data query efficiency.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 217-234"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000014/pdfft?md5=4cbb598cfddbffa06e124be5e2862437&pid=1-s2.0-S2667345224000014-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139718720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review 物联网网络入侵检测的多目标优化算法:系统综述
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.01.003
Shubhkirti Sharma , Vijay Kumar , Kamlesh Dutta

The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features. The Intrusion detection system faces a trade-off between various parameters such as detection accuracy, relevance, redundancy, false alarm rate, and other objectives. The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. MOAs provide a set of optimized solutions for the intrusion detection process in highly complex IoT networks. This paper presents the identification of multiple objectives of intrusion detection, comparative analysis of multi-objective algorithms for intrusion detection in IoT based on their approaches, and the datasets used for their evaluation. The multi-objective optimization algorithms show the encouraging potential in IoT networks to enhance multiple conflicting objectives for intrusion detection. Additionally, the current challenges and future research ideas are identified. In addition to demonstrating new advancements in intrusion detection techniques, this study attempts to identify research gaps that can be addressed while designing intrusion detection systems for IoT networks.

由于数字革命和业务量的增加,入侵检测系统在网络中的重要性与日俱增。入侵检测方法根据数据特征对网络流量进行威胁或正常分类。入侵检测系统面临着检测准确性、相关性、冗余性、误报率等各种参数和其他目标之间的权衡。本文系统回顾了物联网(IoT)网络中使用多目标优化算法(MOA)进行入侵检测的情况,以识别利用安全漏洞的企图,降低安全攻击的几率。MOA 为高度复杂的物联网网络中的入侵检测过程提供了一套优化解决方案。本文介绍了入侵检测多目标的识别、基于其方法的物联网入侵检测多目标算法的比较分析以及用于评估的数据集。多目标优化算法显示了物联网网络在增强入侵检测的多重冲突目标方面令人鼓舞的潜力。此外,还确定了当前的挑战和未来的研究思路。除了展示入侵检测技术的新进展外,本研究还试图找出在设计物联网网络入侵检测系统时可以解决的研究空白。
{"title":"Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review","authors":"Shubhkirti Sharma ,&nbsp;Vijay Kumar ,&nbsp;Kamlesh Dutta","doi":"10.1016/j.iotcps.2024.01.003","DOIUrl":"10.1016/j.iotcps.2024.01.003","url":null,"abstract":"<div><p>The significance of intrusion detection systems in networks has grown because of the digital revolution and increased operations. The intrusion detection method classifies the network traffic as threat or normal based on the data features. The Intrusion detection system faces a trade-off between various parameters such as detection accuracy, relevance, redundancy, false alarm rate, and other objectives. The paper presents a systematic review of intrusion detection in Internet of Things (IoT) networks using multi-objective optimization algorithms (MOA), to identify attempts at exploiting security vulnerabilities and reducing the chances of security attacks. MOAs provide a set of optimized solutions for the intrusion detection process in highly complex IoT networks. This paper presents the identification of multiple objectives of intrusion detection, comparative analysis of multi-objective algorithms for intrusion detection in IoT based on their approaches, and the datasets used for their evaluation. The multi-objective optimization algorithms show the encouraging potential in IoT networks to enhance multiple conflicting objectives for intrusion detection. Additionally, the current challenges and future research ideas are identified. In addition to demonstrating new advancements in intrusion detection techniques, this study attempts to identify research gaps that can be addressed while designing intrusion detection systems for IoT networks.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 258-267"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000038/pdfft?md5=19510c1690405bb751695fbd58ac122c&pid=1-s2.0-S2667345224000038-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139812070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Credit card default prediction using ML and DL techniques 利用 ML 和 DL 技术预测信用卡违约情况
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.09.001
Fazal Wahab , Imran Khan , Sneha Sabada

The banking sector is widely acknowledged for its intrinsic unpredictability and susceptibility to risk. Bank loans have emerged as one of the most recent services offered over the past several decades. Banks typically serve as intermediaries for loans, investments, short-term loans, and other types of credit. The usage of credit cards is experiencing a steady increase, thereby leading to a rise in the default rate that banks encounter. Although there has been much research investigating the efficacy of conventional Machine Learning (ML) models, there has been relatively less emphasis on Deep Learning (DL) techniques. The application of DL approaches to credit card default prediction has not been extensively researched despite their considerable potential in numerous fields. Moreover, the current literature frequently lacks particular information regarding the DL structures, hyperparameters, and optimization techniques employed. To predict credit card default, this study evaluates the efficacy of a DL model and compares it to other ML models, such as Decision Tree (DT) and Adaboost. The objective of this research is to identify the specific DL parameters that contribute to the observed enhancements in the accuracy of credit card default prediction. This research makes use of the UCI ML repository to access the credit card defaulted customer dataset. Subsequently, various techniques are employed to preprocess the unprocessed data and visually present the outcomes through the use of exploratory data analysis (EDA). Furthermore, the algorithms are hypertuned to evaluate the enhancement in prediction. We used standard evaluation metrics to evaluate all the models. The evaluation indicates that the AdaBoost and DT exhibit the highest accuracy rate of 82 ​% in predicting credit card default, surpassing the accuracy of the ANN model, which is 78 ​%.

银行业因其固有的不可预测性和易受风险影响而广为人知。在过去几十年中,银行贷款已成为最新提供的服务之一。银行通常是贷款、投资、短期贷款和其他类型信贷的中介。信用卡的使用率正在稳步上升,从而导致银行遇到的违约率上升。尽管对传统机器学习(ML)模型的功效进行了大量研究,但对深度学习(DL)技术的重视程度相对较低。尽管深度学习方法在许多领域都具有相当大的潜力,但将其应用于信用卡违约预测的研究却并不广泛。此外,目前的文献经常缺乏有关深度学习结构、超参数和优化技术的具体信息。为了预测信用卡违约,本研究评估了 DL 模型的功效,并将其与决策树 (DT) 和 Adaboost 等其他 ML 模型进行了比较。本研究的目的是找出有助于提高信用卡违约预测准确性的特定 DL 参数。本研究利用 UCI ML 资源库访问信用卡违约客户数据集。随后,采用各种技术对未经处理的数据进行预处理,并通过探索性数据分析(EDA)直观地展示结果。此外,还对算法进行了超调,以评估预测的增强效果。我们使用标准评估指标对所有模型进行评估。评估结果表明,AdaBoost 和 DT 预测信用卡违约的准确率最高,达到 82%,超过 ANN 模型的 78%。
{"title":"Credit card default prediction using ML and DL techniques","authors":"Fazal Wahab ,&nbsp;Imran Khan ,&nbsp;Sneha Sabada","doi":"10.1016/j.iotcps.2024.09.001","DOIUrl":"10.1016/j.iotcps.2024.09.001","url":null,"abstract":"<div><p>The banking sector is widely acknowledged for its intrinsic unpredictability and susceptibility to risk. Bank loans have emerged as one of the most recent services offered over the past several decades. Banks typically serve as intermediaries for loans, investments, short-term loans, and other types of credit. The usage of credit cards is experiencing a steady increase, thereby leading to a rise in the default rate that banks encounter. Although there has been much research investigating the efficacy of conventional Machine Learning (ML) models, there has been relatively less emphasis on Deep Learning (DL) techniques. The application of DL approaches to credit card default prediction has not been extensively researched despite their considerable potential in numerous fields. Moreover, the current literature frequently lacks particular information regarding the DL structures, hyperparameters, and optimization techniques employed. To predict credit card default, this study evaluates the efficacy of a DL model and compares it to other ML models, such as Decision Tree (DT) and Adaboost. The objective of this research is to identify the specific DL parameters that contribute to the observed enhancements in the accuracy of credit card default prediction. This research makes use of the UCI ML repository to access the credit card defaulted customer dataset. Subsequently, various techniques are employed to preprocess the unprocessed data and visually present the outcomes through the use of exploratory data analysis (EDA). Furthermore, the algorithms are hypertuned to evaluate the enhancement in prediction. We used standard evaluation metrics to evaluate all the models. The evaluation indicates that the AdaBoost and DT exhibit the highest accuracy rate of 82 ​% in predicting credit card default, surpassing the accuracy of the ANN model, which is 78 ​%.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 293-306"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000087/pdfft?md5=f77f275cf416221418432e3c1d730036&pid=1-s2.0-S2667345224000087-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142168457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing immersive toy trial experience in mobile augmented reality 在移动增强现实技术中构建身临其境的玩具试用体验
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.02.001
Lingxin Yu, Jiacheng Zhang, Xinyue Wang, Siru Chen, Xuehao Qin, Zhifei Ding, Jiahao Han

When consumers purchase toys from retail stores, the majority of toys are packaged, making it difficult for them to observe the toys comprehensively. This limitation may hinder their ability to make informed purchase decisions. To address this challenge, this paper introduces an immersive toy experience program utilizing augmented reality (AR) technology. The program utilizes the camera on mobile devices to scan and identify the toy's cover image, subsequently showcasing corresponding virtual toy models in a simulated environment. Additionally, interactive controls enable users to manipulate the viewing angles. In terms of methodology, we have specifically designed an expandable collection of toy images, allowing the recognition of recently introduced toys by adding them to the database, enhancing the scalability of our application. In comparison to previous research, our work transcends the constraints of traditional toy shopping, providing a more intuitive, interactive, and personalized experience through AR technology.

消费者在零售店购买玩具时,大多数玩具都是包装好的,因此很难对玩具进行全面观察。这种限制可能会妨碍他们做出明智的购买决定。为了应对这一挑战,本文介绍了一种利用增强现实(AR)技术的沉浸式玩具体验程序。该程序利用移动设备上的摄像头扫描并识别玩具的封面图像,随后在模拟环境中展示相应的虚拟玩具模型。此外,用户还可以通过交互式控制来调节观看角度。在方法论方面,我们专门设计了一个可扩展的玩具图片库,通过将最近推出的玩具添加到数据库中,可以识别这些玩具,从而增强了应用程序的可扩展性。与以往的研究相比,我们的工作超越了传统玩具购物的限制,通过 AR 技术提供了更加直观、互动和个性化的体验。
{"title":"Constructing immersive toy trial experience in mobile augmented reality","authors":"Lingxin Yu,&nbsp;Jiacheng Zhang,&nbsp;Xinyue Wang,&nbsp;Siru Chen,&nbsp;Xuehao Qin,&nbsp;Zhifei Ding,&nbsp;Jiahao Han","doi":"10.1016/j.iotcps.2024.02.001","DOIUrl":"10.1016/j.iotcps.2024.02.001","url":null,"abstract":"<div><p>When consumers purchase toys from retail stores, the majority of toys are packaged, making it difficult for them to observe the toys comprehensively. This limitation may hinder their ability to make informed purchase decisions. To address this challenge, this paper introduces an immersive toy experience program utilizing augmented reality (AR) technology. The program utilizes the camera on mobile devices to scan and identify the toy's cover image, subsequently showcasing corresponding virtual toy models in a simulated environment. Additionally, interactive controls enable users to manipulate the viewing angles. In terms of methodology, we have specifically designed an expandable collection of toy images, allowing the recognition of recently introduced toys by adding them to the database, enhancing the scalability of our application. In comparison to previous research, our work transcends the constraints of traditional toy shopping, providing a more intuitive, interactive, and personalized experience through AR technology.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 250-257"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266734522400004X/pdfft?md5=1e3a50014cb3a60d1d2d0bd8be7c6312&pid=1-s2.0-S266734522400004X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139832026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models 物联网安全的机器学习技术:使用生成式人工智能和大型语言模型的当前研究和未来展望
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2023.12.003
Fatima Alwahedi, Alyazia Aldhaheri, Mohamed Amine Ferrag, Ammar Battah, Norbert Tihanyi

Despite providing unparalleled connectivity and convenience, the exponential growth of the Internet of Things (IoT) ecosystem has triggered significant cybersecurity concerns. These concerns stem from various factors, including the heterogeneity of IoT devices, widespread deployment, and inherent computational limitations. Integrating emerging technologies to address these concerns becomes imperative as the dynamic IoT landscape evolves. Machine Learning (ML), a rapidly advancing technology, has shown considerable promise in addressing IoT security issues. It has significantly influenced and advanced research in cyber threat detection. This survey provides a comprehensive overview of current trends, methodologies, and challenges in applying machine learning for cyber threat detection in IoT environments. Specifically, we further perform a comparative analysis of state-of-the-art ML-based Intrusion Detection Systems (IDSs) in the landscape of IoT security. In addition, we shed light on the pressing unresolved issues and challenges within this dynamic field. We provide a future vision with Generative AI and large language models to enhance IoT security. The discussions present an in-depth understanding of different cyber threat detection methods, enhancing the knowledge base of researchers and practitioners alike. This paper is a valuable resource for those keen to delve into the evolving world of cyber threat detection leveraging ML and IoT security.

尽管物联网(IoT)生态系统提供了无与伦比的连接性和便利性,但其指数级增长也引发了重大的网络安全问题。这些问题源于多种因素,包括物联网设备的异构性、广泛部署以及固有的计算局限性。随着动态物联网环境的发展,整合新兴技术以解决这些问题变得势在必行。机器学习(ML)是一项快速发展的技术,在解决物联网安全问题方面已显示出相当大的前景。它极大地影响并推动了网络威胁检测方面的研究。本调查全面概述了在物联网环境中应用机器学习进行网络威胁检测的当前趋势、方法和挑战。具体来说,我们进一步对物联网安全领域最先进的基于 ML 的入侵检测系统(IDS)进行了比较分析。此外,我们还揭示了这一动态领域中尚未解决的紧迫问题和挑战。我们提出了利用生成式人工智能和大型语言模型加强物联网安全的未来愿景。讨论深入介绍了不同的网络威胁检测方法,增强了研究人员和从业人员的知识基础。对于那些热衷于利用人工智能和物联网安全深入研究不断发展的网络威胁检测领域的人来说,本文是一份宝贵的资料。
{"title":"Machine learning techniques for IoT security: Current research and future vision with generative AI and large language models","authors":"Fatima Alwahedi,&nbsp;Alyazia Aldhaheri,&nbsp;Mohamed Amine Ferrag,&nbsp;Ammar Battah,&nbsp;Norbert Tihanyi","doi":"10.1016/j.iotcps.2023.12.003","DOIUrl":"10.1016/j.iotcps.2023.12.003","url":null,"abstract":"<div><p>Despite providing unparalleled connectivity and convenience, the exponential growth of the Internet of Things (IoT) ecosystem has triggered significant cybersecurity concerns. These concerns stem from various factors, including the heterogeneity of IoT devices, widespread deployment, and inherent computational limitations. Integrating emerging technologies to address these concerns becomes imperative as the dynamic IoT landscape evolves. Machine Learning (ML), a rapidly advancing technology, has shown considerable promise in addressing IoT security issues. It has significantly influenced and advanced research in cyber threat detection. This survey provides a comprehensive overview of current trends, methodologies, and challenges in applying machine learning for cyber threat detection in IoT environments. Specifically, we further perform a comparative analysis of state-of-the-art ML-based Intrusion Detection Systems (IDSs) in the landscape of IoT security. In addition, we shed light on the pressing unresolved issues and challenges within this dynamic field. We provide a future vision with Generative AI and large language models to enhance IoT security. The discussions present an in-depth understanding of different cyber threat detection methods, enhancing the knowledge base of researchers and practitioners alike. This paper is a valuable resource for those keen to delve into the evolving world of cyber threat detection leveraging ML and IoT security.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 167-185"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345223000585/pdfft?md5=d4450c6f6b2d36d74f0de919ecba7bd9&pid=1-s2.0-S2667345223000585-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139393793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A self-configuration framework for balancing services in the fog of things 物联网中平衡服务的自配置框架
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.09.003
Edson Mota , Jurandir Barbosa , Gustavo B. Figueiredo , Maycon Peixoto , Cássio Prazeres
Fog Computing has been playing a pivotal role in the Internet of Things (IoT) ecosystem, offering benefits such as local availability, access facilities, and enhanced communication among devices. However, managing numerous gateways in an IoT network poses service distribution and network management challenges, leading to imbalances and inefficiencies. Within this context, this paper presents a novel self-organizing environment based on the Fog of Things approach, designed to address these challenges. Our key contributions include developing the FoT Balance Management service, which dynamically configures and optimizes the distribution of services across the network. This service utilizes advanced load-balancing algorithms to ensure the workload is evenly distributed among the available gateways, preventing any single node from becoming a bottleneck for the service distributions. Additionally, we integrate Apache Karaf Cellar for real-time monitoring and adaptive reconfiguration. This integration allows the system to continuously monitor the network state and automatically reconfigure the service distribution in response to changes, such as adding or removing nodes. This approach ensures seamless adaptation to network changes, maintaining high performance and load balancing. We validate our solution through planned experiments using ANOVA and a 2k factorial design. The experimental results demonstrate significant improvements in network performance, response time, and load balancing. Specifically, in scenarios with ten fog nodes, our approach increases average availability by 10 ​%–20 ​% and achieves 70 ​%–80 ​% load balancing. The analysis reveals that the absence of a balancing strategy can reduce availability by approximately 30 ​%. Our proposed solution effectively prevents infrastructure overload, balancing computation costs and node availability, thereby enhancing the efficiency and responsiveness of the IoT ecosystem.
雾计算在物联网(IoT)生态系统中发挥着举足轻重的作用,具有本地可用性、接入设施和增强设备间通信等优势。然而,在物联网网络中管理众多网关会带来服务分配和网络管理方面的挑战,从而导致失衡和低效。在此背景下,本文提出了一种基于物联网方法的新型自组织环境,旨在应对这些挑战。我们的主要贡献包括开发了 FoT 平衡管理服务,该服务可动态配置和优化整个网络的服务分配。该服务利用先进的负载平衡算法,确保工作负载在可用网关之间均匀分布,防止任何单个节点成为服务分配的瓶颈。此外,我们还集成了 Apache Karaf Cellar,用于实时监控和自适应重新配置。这种集成允许系统持续监控网络状态,并根据变化(如添加或删除节点)自动重新配置服务分布。这种方法可确保无缝适应网络变化,保持高性能和负载平衡。我们利用方差分析和 2k 因式设计,通过计划实验验证了我们的解决方案。实验结果表明,网络性能、响应时间和负载平衡都有明显改善。具体来说,在有 10 个雾节点的情况下,我们的方法将平均可用性提高了 10%-20%,并实现了 70%-80% 的负载平衡。分析表明,如果没有平衡策略,可用性会降低约 30%。我们提出的解决方案可有效防止基础设施过载,平衡计算成本和节点可用性,从而提高物联网生态系统的效率和响应能力。
{"title":"A self-configuration framework for balancing services in the fog of things","authors":"Edson Mota ,&nbsp;Jurandir Barbosa ,&nbsp;Gustavo B. Figueiredo ,&nbsp;Maycon Peixoto ,&nbsp;Cássio Prazeres","doi":"10.1016/j.iotcps.2024.09.003","DOIUrl":"10.1016/j.iotcps.2024.09.003","url":null,"abstract":"<div><div>Fog Computing has been playing a pivotal role in the Internet of Things (IoT) ecosystem, offering benefits such as local availability, access facilities, and enhanced communication among devices. However, managing numerous gateways in an IoT network poses service distribution and network management challenges, leading to imbalances and inefficiencies. Within this context, this paper presents a novel self-organizing environment based on the Fog of Things approach, designed to address these challenges. Our key contributions include developing the FoT Balance Management service, which dynamically configures and optimizes the distribution of services across the network. This service utilizes advanced load-balancing algorithms to ensure the workload is evenly distributed among the available gateways, preventing any single node from becoming a bottleneck for the service distributions. Additionally, we integrate Apache Karaf Cellar for real-time monitoring and adaptive reconfiguration. This integration allows the system to continuously monitor the network state and automatically reconfigure the service distribution in response to changes, such as adding or removing nodes. This approach ensures seamless adaptation to network changes, maintaining high performance and load balancing. We validate our solution through planned experiments using ANOVA and a 2<sup><em>k</em></sup> factorial design. The experimental results demonstrate significant improvements in network performance, response time, and load balancing. Specifically, in scenarios with ten fog nodes, our approach increases average availability by 10 ​%–20 ​% and achieves 70 ​%–80 ​% load balancing. The analysis reveals that the absence of a balancing strategy can reduce availability by approximately 30 ​%. Our proposed solution effectively prevents infrastructure overload, balancing computation costs and node availability, thereby enhancing the efficiency and responsiveness of the IoT ecosystem.</div></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 318-332"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142357929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Green buildings: Requirements, features, life cycle, and relevant intelligent technologies 绿色建筑:要求、特点、生命周期和相关智能技术
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.09.002
Siyi Yin , Jinsong Wu , Junhui Zhao , Michele Nogueira , Jaime Lloret

Green buildings are designed and constructed according to the principles of sustainable development and are an inevitable trend in future architectural development. Nowadays, many works have studied the application of intelligence or intelligent technology in green intelligent buildings, but there is still insufficient discussion on how to integrate intelligent technology into all aspects of buildings. In view of this, this paper summarizes the design concepts of modern green buildings and takes this as the starting point to explore the classification and construction of the core needs for achieving sustainable development throughout the life cycle of buildings from five aspects: building design, building materials, building construction, building renewal and management, and building damage, and analyze the integration of relevant intelligent technologies in buildings under different needs.

绿色建筑是按照可持续发展的原则进行设计和建造的,是未来建筑发展的必然趋势。目前,已有不少著作对智能化或智能技术在绿色智能建筑中的应用进行了研究,但对于如何将智能技术融入建筑的方方面面仍探讨不足。有鉴于此,本文总结了现代绿色建筑的设计理念,并以此为切入点,从建筑设计、建筑材料、建筑施工、建筑更新与管理、建筑损伤五个方面探讨了实现建筑全生命周期可持续发展的核心需求的分类与构建,并分析了不同需求下相关智能技术在建筑中的融合。
{"title":"Green buildings: Requirements, features, life cycle, and relevant intelligent technologies","authors":"Siyi Yin ,&nbsp;Jinsong Wu ,&nbsp;Junhui Zhao ,&nbsp;Michele Nogueira ,&nbsp;Jaime Lloret","doi":"10.1016/j.iotcps.2024.09.002","DOIUrl":"10.1016/j.iotcps.2024.09.002","url":null,"abstract":"<div><p>Green buildings are designed and constructed according to the principles of sustainable development and are an inevitable trend in future architectural development. Nowadays, many works have studied the application of intelligence or intelligent technology in green intelligent buildings, but there is still insufficient discussion on how to integrate intelligent technology into all aspects of buildings. In view of this, this paper summarizes the design concepts of modern green buildings and takes this as the starting point to explore the classification and construction of the core needs for achieving sustainable development throughout the life cycle of buildings from five aspects: building design, building materials, building construction, building renewal and management, and building damage, and analyze the integration of relevant intelligent technologies in buildings under different needs.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 307-317"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000099/pdfft?md5=e3c9fa24b3676e2145e2d3f777ca90f2&pid=1-s2.0-S2667345224000099-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural network inspired efficient scalable task scheduling for cloud infrastructure 受神经网络启发的云基础设施高效可扩展任务调度
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.02.002
Punit Gupta , Arnaav Anand , Pratyush Agarwal , Gavin McArdle

The rapid development of Cloud Computing in the 21st Century is landmark occasion, not only in the field of technology, but also in the field of engineering and services. The development in cloud architecture and services has enabled fast and easy transfer of data from one unit of a network to other. Cloud services support the latest transport services like smart cars, smart aviation services and many others. In the current trend, smart transport services depend on the performance of cloud Infrastructure and its services. Smart cloud services derive real time computing and allows it to make smart decision. For further improvement in cloud services, cloud resource optimization is a vital cog that defines the performance of cloud. Cloud services have certainly aimed to make the optimum use of all available resources to the become as cost efficient and time efficient as possible. One of the issues that still occur in multiple Cloud Environments is a failure in task execution. While there exist multiple methods to tackle this problem in task scheduling, in the recent times, the use of smart scheduling techniques has come to prominence. In this work, we aim to use the Harmony Search Algorithm and neural networks to create a fault aware system for optimal usage of cloud resources. Cloud environments are in general expected to be free of any errors or faults but with time and experience, we know that no system can be faultless. With our approach, we are looking to create the best possible time-efficient system for faulty environments, Where the result shows that the proposed harmony search-inspired ANN model provides least execution time, number of task failures, power consumption and high resource utilization as compared to recent Red fox and Crow search inspired models.

21 世纪云计算的快速发展不仅在技术领域,而且在工程和服务领域都具有里程碑意义。云架构和云服务的发展使数据能够快速、便捷地从一个网络单元传输到另一个网络单元。云服务为智能汽车、智能航空服务等最新交通服务提供支持。在当前趋势下,智能交通服务取决于云基础设施及其服务的性能。智能云服务衍生出实时计算,并允许其做出智能决策。为进一步改善云服务,云资源优化是决定云性能的重要齿轮。云服务的目标当然是优化使用所有可用资源,尽可能提高成本效率和时间效率。在多个云环境中仍会出现的问题之一是任务执行失败。虽然在任务调度中存在多种方法来解决这一问题,但近来,智能调度技术的使用已变得十分突出。在这项工作中,我们旨在利用和谐搜索算法和神经网络创建一个故障感知系统,以优化云资源的使用。一般来说,人们期望云环境不会出现任何错误或故障,但随着时间的推移和经验的积累,我们知道没有一个系统是无故障的。通过我们的方法,我们希望为有故障的环境创建最佳的时间效率系统。结果表明,与最近的红狐和乌鸦搜索启发模型相比,所提出的和谐搜索启发的 ANN 模型提供了最少的执行时间、任务失败次数、功耗和较高的资源利用率。
{"title":"Neural network inspired efficient scalable task scheduling for cloud infrastructure","authors":"Punit Gupta ,&nbsp;Arnaav Anand ,&nbsp;Pratyush Agarwal ,&nbsp;Gavin McArdle","doi":"10.1016/j.iotcps.2024.02.002","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.02.002","url":null,"abstract":"<div><p>The rapid development of Cloud Computing in the 21st Century is landmark occasion, not only in the field of technology, but also in the field of engineering and services. The development in cloud architecture and services has enabled fast and easy transfer of data from one unit of a network to other. Cloud services support the latest transport services like smart cars, smart aviation services and many others. In the current trend, smart transport services depend on the performance of cloud Infrastructure and its services. Smart cloud services derive <em>real</em> time computing and allows it to make smart decision. For further improvement in cloud services, cloud resource optimization is a vital cog that defines the performance of cloud. Cloud services have certainly aimed to make the optimum use of all available resources to the become as cost efficient and time efficient as possible. One of the issues that still occur in multiple Cloud Environments is a failure in task execution. While there exist multiple methods to tackle this problem in task scheduling, in the recent times, the use of smart scheduling techniques has come to prominence. In this work, we aim to use the Harmony Search Algorithm and neural networks to create a fault aware system for optimal usage of cloud resources. Cloud environments are in general expected to be free of any errors or faults but with time and experience, we know that no system can be faultless. With our approach, we are looking to create the best possible time-efficient system for faulty environments, Where the result shows that the proposed harmony search-inspired ANN model provides least execution time, number of task failures, power consumption and high resource utilization as compared to recent Red fox and Crow search inspired models.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 268-279"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000051/pdfft?md5=52d4b3c6032dcde3e4d8b4568429050a&pid=1-s2.0-S2667345224000051-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140113276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metaverse for smart cities: A survey 智慧城市的元宇宙:一项调查
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2023.12.002
Zefeng Chen , Wensheng Gan , Jiayang Wu , Hong Lin , Chien-Ming Chen

The concept of a smart city is geared towards enhancing convenience and the efficient management of city areas through innovation. As Metaverse rises in the 2020s, providing the possible direction for a new generation of the Internet, it has a huge number of opportunities to promote smart cities. The Metaverse can empower smart cities in various aspects. In this article, we provide a detailed review of smart cities based on Metaverse technologies. Firstly, we introduce the Metaverse and smart cities and describe the future vision and applications of smart cities, which are based on the Metaverse. In addition, we discuss the essential technologies for smart cities in the Metaverse and the currently available solutions. Additionally, we have some concerns regarding the potential of Metaverse and there are still unresolved issues that should be addressed. The purpose of this article is to provide researchers and developers with essential guidance and opportunities to propel the development of the Metaverse and smart cities.

智慧城市的概念旨在通过创新提高城市区域的便利性和管理效率。随着 Metaverse 在 2020 年代的崛起,为新一代互联网提供了可能的发展方向,它为推动智慧城市的发展提供了大量机会。Metaverse 可以在各个方面为智慧城市赋能。本文将对基于 Metaverse 技术的智慧城市进行详细评述。首先,我们介绍了 Metaverse 和智慧城市,并描述了基于 Metaverse 的智慧城市的未来愿景和应用。此外,我们还讨论了 Metaverse 中智慧城市的基本技术以及当前可用的解决方案。此外,我们还对 Metaverse 的潜力表示担忧,认为仍有一些尚未解决的问题需要解决。本文旨在为研究人员和开发人员提供必要的指导和机会,以推动 Metaverse 和智慧城市的发展。
{"title":"Metaverse for smart cities: A survey","authors":"Zefeng Chen ,&nbsp;Wensheng Gan ,&nbsp;Jiayang Wu ,&nbsp;Hong Lin ,&nbsp;Chien-Ming Chen","doi":"10.1016/j.iotcps.2023.12.002","DOIUrl":"10.1016/j.iotcps.2023.12.002","url":null,"abstract":"<div><p>The concept of a smart city is geared towards enhancing convenience and the efficient management of city areas through innovation. As Metaverse rises in the 2020s, providing the possible direction for a new generation of the Internet, it has a huge number of opportunities to promote smart cities. The Metaverse can empower smart cities in various aspects. In this article, we provide a detailed review of smart cities based on Metaverse technologies. Firstly, we introduce the Metaverse and smart cities and describe the future vision and applications of smart cities, which are based on the Metaverse. In addition, we discuss the essential technologies for smart cities in the Metaverse and the currently available solutions. Additionally, we have some concerns regarding the potential of Metaverse and there are still unresolved issues that should be addressed. The purpose of this article is to provide researchers and developers with essential guidance and opportunities to propel the development of the Metaverse and smart cities.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 203-216"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345223000573/pdfft?md5=4b1fea1706d8c4603535fe4a90823712&pid=1-s2.0-S2667345223000573-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139456814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain sharding scheme based on generative AI and DRL: Applied to building internet of things 基于生成式人工智能和 DRL 的区块链分片方案:应用于构建物联网
Pub Date : 2024-01-01 DOI: 10.1016/j.iotcps.2024.11.001
Jinlong Wang , Yixin Li , Yunting Wu , Wenhu Zheng , Shangzhuo Zhou , Xiaoyun Xiong
When applying blockchain sharding technology in the building Internet of Things (IoT) domain to enhance the throughput performance of the blockchain, cross-shard transactions triggered by device collaborative tasks have increasingly become a prominent issue. Existing solutions base their shard division on historical transaction moments, using the outcomes for future transaction processing. However, since the historical interaction characteristics do not accurately reflect the interaction details within specific fine-grained time periods, this leads to poor system performance. Additionally, the parameter configuration in blockchain sharding systems is mostly based on arbitrary or default settings, which also results in unstable system performance. To address these two challenges, this paper proposes a blockchain sharding scheme called AI-Shard. Firstly, the system includes a module, G-AI, that utilizes generative AI to predict future node interaction relationships, enabling more proactive and adaptive shard division based on the predicted interaction matrix. Secondly, the system integrates a reinforcement learning module, DL-AI, specifically tailored for configuring parameters of the blockchain sharding system, such as the number of shards, block size, and block interval, to automatically optimize them, aiming to further enhance the system's throughput. Experimental results show that AI-Shard can reduce the proportion of cross-shard transactions and improve the system's throughput.
在楼宇物联网(IoT)领域应用区块链分片技术以提高区块链的吞吐性能时,设备协作任务引发的跨分片交易日益成为一个突出问题。现有解决方案基于历史交易时刻进行分块划分,并将结果用于未来的交易处理。然而,由于历史交互特征不能准确反映特定细粒度时间段内的交互细节,这导致系统性能低下。此外,区块链分片系统中的参数配置大多基于任意或默认设置,这也会导致系统性能不稳定。为了解决这两个难题,本文提出了一种名为 AI-Shard 的区块链分片方案。首先,该系统包含一个模块--G-AI,它利用生成式人工智能预测未来节点的交互关系,从而根据预测的交互矩阵实现更主动、更自适应的分片。其次,系统集成了强化学习模块 DL-AI,专门用于配置区块链分片系统的参数,如分片数量、区块大小和区块间隔等,并自动进行优化,旨在进一步提高系统的吞吐量。实验结果表明,AI-Shard 可以降低跨分片交易的比例,提高系统的吞吐量。
{"title":"Blockchain sharding scheme based on generative AI and DRL: Applied to building internet of things","authors":"Jinlong Wang ,&nbsp;Yixin Li ,&nbsp;Yunting Wu ,&nbsp;Wenhu Zheng ,&nbsp;Shangzhuo Zhou ,&nbsp;Xiaoyun Xiong","doi":"10.1016/j.iotcps.2024.11.001","DOIUrl":"10.1016/j.iotcps.2024.11.001","url":null,"abstract":"<div><div>When applying blockchain sharding technology in the building Internet of Things (IoT) domain to enhance the throughput performance of the blockchain, cross-shard transactions triggered by device collaborative tasks have increasingly become a prominent issue. Existing solutions base their shard division on historical transaction moments, using the outcomes for future transaction processing. However, since the historical interaction characteristics do not accurately reflect the interaction details within specific fine-grained time periods, this leads to poor system performance. Additionally, the parameter configuration in blockchain sharding systems is mostly based on arbitrary or default settings, which also results in unstable system performance. To address these two challenges, this paper proposes a blockchain sharding scheme called AI-Shard. Firstly, the system includes a module, G-AI, that utilizes generative AI to predict future node interaction relationships, enabling more proactive and adaptive shard division based on the predicted interaction matrix. Secondly, the system integrates a reinforcement learning module, DL-AI, specifically tailored for configuring parameters of the blockchain sharding system, such as the number of shards, block size, and block interval, to automatically optimize them, aiming to further enhance the system's throughput. Experimental results show that AI-Shard can reduce the proportion of cross-shard transactions and improve the system's throughput.</div></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 333-349"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142698853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet of Things and Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1