首页 > 最新文献

Computing最新文献

英文 中文
Edge-driven Docker registry: facilitating XR application deployment 边缘驱动的 Docker 注册表:促进 XR 应用部署
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-24 DOI: 10.1007/s00607-024-01310-0
Antonios Makris, Evangelos Psomakelis, Ioannis Korontanis, Theodoros Theodoropoulos, Ioannis Kontopoulos, Maria Pateraki, Christos Diou, Konstantinos Tserpes

In recent years, containerization is becoming more and more popular for deploying applications and services and it has significantly contributed to the expansion of edge computing. The demand for effective and scalable container image management, however, increases as the number of containers deployed grows. One solution is to use a localized Docker registry at the edge, where the images are stored closer to the deployment site. This approach can considerably reduce the latency and bandwidth required to download images from a central registry. In addition, it acts as a proactive caching mechanism by optimizing the download delays and the network traffic. In this paper, we introduce an edge-enabled storage framework that incorporates a localized Docker registry. This framework aims to streamline the storage and distribution of container images, providing improved control, scalability, and optimized capabilities for edge deployment. Four demanding XR applications are employed as use cases to experiment with the proposed solution.

近年来,容器化在部署应用程序和服务方面越来越流行,并极大地促进了边缘计算的扩展。然而,随着部署容器数量的增加,对有效且可扩展的容器映像管理的需求也随之增加。一种解决方案是在边缘使用本地化的 Docker 注册表,将映像存储在离部署站点更近的地方。这种方法可以大大减少从中央注册中心下载映像所需的延迟和带宽。此外,它还能优化下载延迟和网络流量,起到主动缓存机制的作用。在本文中,我们介绍了一种结合了本地化 Docker 注册表的边缘存储框架。该框架旨在简化容器映像的存储和分发,为边缘部署提供更好的控制、可扩展性和优化功能。我们采用了四个要求苛刻的 XR 应用程序作为用例,对所提出的解决方案进行实验。
{"title":"Edge-driven Docker registry: facilitating XR application deployment","authors":"Antonios Makris, Evangelos Psomakelis, Ioannis Korontanis, Theodoros Theodoropoulos, Ioannis Kontopoulos, Maria Pateraki, Christos Diou, Konstantinos Tserpes","doi":"10.1007/s00607-024-01310-0","DOIUrl":"https://doi.org/10.1007/s00607-024-01310-0","url":null,"abstract":"<p>In recent years, containerization is becoming more and more popular for deploying applications and services and it has significantly contributed to the expansion of edge computing. The demand for effective and scalable container image management, however, increases as the number of containers deployed grows. One solution is to use a localized Docker registry at the edge, where the images are stored closer to the deployment site. This approach can considerably reduce the latency and bandwidth required to download images from a central registry. In addition, it acts as a proactive caching mechanism by optimizing the download delays and the network traffic. In this paper, we introduce an edge-enabled storage framework that incorporates a localized Docker registry. This framework aims to streamline the storage and distribution of container images, providing improved control, scalability, and optimized capabilities for edge deployment. Four demanding XR applications are employed as use cases to experiment with the proposed solution.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"53 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141509647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MAC approaches to communication efficiency and reliability under dynamic network traffic in wireless body area networks: a review 无线体域网络动态网络流量下的通信效率和可靠性 MAC 方法:综述
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-20 DOI: 10.1007/s00607-024-01307-9
Jorge Herculano, Willians Pereira, Marcelo Guimarães, Reinaldo Cotrim, Alirio de Sá, Flávio Assis, Raimundo Macêdo, Sérgio Gorender

Wireless Body Area Networks (WBANs) are wireless sensor networks that monitor the physiological and contextual data of the human body. Nodes in a WBAN communicate using short-range and low-power transmissions to minimize any impact on the human body’s health and mobility. These transmissions thus become subject to failures caused by radiofrequency interference or body mobility. Additionally, WBAN applications typically have timing constraints and carry dynamic traffic, which can change depending on the physiological conditions of the human body. Several approaches for the Medium Access Control (MAC) sublayer have been proposed to improve the reliability and efficiency of the WBANs. This paper proposes and uses a systematic literature review (SLR) method to identify, classify, and statistically analyze the published works with MAC approaches for WBAN efficiency and reliability under dynamic network traffic, radiofrequency interference, and body mobility. In particular, we extend a traditional SLR method by adding a new step to select publications based on qualitative parameters. As a result, we identify the challenges and proposed solutions, highlight advantages and disadvantages, and suggest future works.

无线体感区域网络(WBAN)是一种监测人体生理和环境数据的无线传感器网络。WBAN 中的节点使用短距离和低功耗传输进行通信,以尽量减少对人体健康和移动性的影响。因此,这些传输会因射频干扰或人体移动性而出现故障。此外,WBAN 应用通常有时间限制,并携带动态流量,这些流量会随着人体生理状况的变化而变化。为了提高无线局域网的可靠性和效率,人们提出了几种介质访问控制(MAC)子层的方法。本文提出并使用系统文献综述(SLR)方法来识别、分类和统计分析已发表的有关在动态网络流量、射频干扰和人体移动性条件下提高无线局域网效率和可靠性的 MAC 方法的著作。特别是,我们扩展了传统的 SLR 方法,增加了一个新步骤,根据定性参数选择出版物。因此,我们确定了面临的挑战和建议的解决方案,强调了优缺点,并对未来的工作提出了建议。
{"title":"MAC approaches to communication efficiency and reliability under dynamic network traffic in wireless body area networks: a review","authors":"Jorge Herculano, Willians Pereira, Marcelo Guimarães, Reinaldo Cotrim, Alirio de Sá, Flávio Assis, Raimundo Macêdo, Sérgio Gorender","doi":"10.1007/s00607-024-01307-9","DOIUrl":"https://doi.org/10.1007/s00607-024-01307-9","url":null,"abstract":"<p>Wireless Body Area Networks (WBANs) are wireless sensor networks that monitor the physiological and contextual data of the human body. Nodes in a WBAN communicate using short-range and low-power transmissions to minimize any impact on the human body’s health and mobility. These transmissions thus become subject to failures caused by radiofrequency interference or body mobility. Additionally, WBAN applications typically have timing constraints and carry dynamic traffic, which can change depending on the physiological conditions of the human body. Several approaches for the Medium Access Control (MAC) sublayer have been proposed to improve the reliability and efficiency of the WBANs. This paper proposes and uses a systematic literature review (SLR) method to identify, classify, and statistically analyze the published works with MAC approaches for WBAN efficiency and reliability under dynamic network traffic, radiofrequency interference, and body mobility. In particular, we extend a traditional SLR method by adding a new step to select publications based on qualitative parameters. As a result, we identify the challenges and proposed solutions, highlight advantages and disadvantages, and suggest future works.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"1 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141509692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-aware dynamic response and efficient consolidation strategies for disaster survivability of cloud microservices architecture 面向云微服务架构灾难生存能力的能源感知动态响应和高效整合策略
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-17 DOI: 10.1007/s00607-024-01305-x
Iure Fé, Tuan Anh Nguyen, Mario Di Mauro, Fabio Postiglione, Alex Ramos, André Soares, Eunmi Choi, Dugki Min, Jae Woo Lee, Francisco Airton Silva

Computer system resilience refers to the ability of a computer system to continue functioning even in the face of unexpected events or disruptions. These disruptions can be caused by a variety of factors, such as hardware failures, software glitches, cyber attacks, or even natural disasters. Modern computational environments need applications that can recover quickly from major disruptions while also being environmentally sustainable. Balancing system resilience with energy efficiency is challenging, as efforts to improve one can harm the other. This paper presents a method to enhance disaster survivability in microservice architectures, particularly those using Kubernetes in cloud-based environments, focusing on optimizing electrical energy use. Aiming to save energy, our work adopt the consolidation strategy that means grouping multiple microservices on a single host. Our aproach uses a widely adopted analytical model, the Generalized Stochastic Petri Net (GSPN). GSPN are a powerful modeling technique that is widely used in various fields, including engineering, computer science, and operations research. One of the primary advantages of GSPN is its ability to model complex systems with a high degree of accuracy. Additionally, GSPN allows for the modeling of both logical and stochastic behavior, making it ideal for systems that involve a combination of both. Our GSPN models compute a number of metrics such as: recovery time, system availability, reliability, Mean Time to Failure, and the configuration of cloud-based microservices. We compared our approach against others focusing on survivability or efficiency. Our approach aligns with Recovery Time Objectives during sudden disasters and offers the fastest recovery, requiring 9% less warning time to fully recover in cases of disaster with alert when compared to strategies with similar electrical consumption. It also saves about 27% energy compared to low consolidation strategies and 5% against high consolidation under static conditions.

计算机系统恢复能力是指计算机系统在面对突发事件或中断时仍能继续运行的能力。这些中断可能由多种因素造成,如硬件故障、软件故障、网络攻击甚至自然灾害。现代计算环境需要既能从重大中断中快速恢复,又具有环境可持续性的应用程序。在系统恢复能力和能源效率之间取得平衡具有挑战性,因为改善其中一个方面的努力可能会损害另一个方面。本文介绍了一种提高微服务架构(尤其是在基于云的环境中使用 Kubernetes 的微服务架构)灾难生存能力的方法,重点是优化电能使用。为了节约能源,我们的工作采用了整合策略,即在单个主机上组合多个微服务。我们的方法采用了一种广泛采用的分析模型--广义随机 Petri 网(GSPN)。GSPN 是一种强大的建模技术,广泛应用于工程、计算机科学和运筹学等多个领域。GSPN 的主要优势之一是能够对复杂系统进行高精度建模。此外,GSPN 还能对逻辑行为和随机行为进行建模,因此非常适合涉及逻辑行为和随机行为的系统。我们的 GSPN 模型可以计算一系列指标,例如:恢复时间、系统可用性、可靠性、平均故障时间以及基于云的微服务的配置。我们将我们的方法与其他专注于生存性或效率的方法进行了比较。我们的方法符合突发性灾难期间的恢复时间目标,并能提供最快的恢复速度,与耗电量相似的策略相比,在有警报的灾难情况下,完全恢复所需的预警时间减少了 9%。在静态条件下,与低整合策略相比,它还能节省约 27% 的能源,与高整合策略相比,能节省 5% 的能源。
{"title":"Energy-aware dynamic response and efficient consolidation strategies for disaster survivability of cloud microservices architecture","authors":"Iure Fé, Tuan Anh Nguyen, Mario Di Mauro, Fabio Postiglione, Alex Ramos, André Soares, Eunmi Choi, Dugki Min, Jae Woo Lee, Francisco Airton Silva","doi":"10.1007/s00607-024-01305-x","DOIUrl":"https://doi.org/10.1007/s00607-024-01305-x","url":null,"abstract":"<p>Computer system resilience refers to the ability of a computer system to continue functioning even in the face of unexpected events or disruptions. These disruptions can be caused by a variety of factors, such as hardware failures, software glitches, cyber attacks, or even natural disasters. Modern computational environments need applications that can recover quickly from major disruptions while also being environmentally sustainable. Balancing system resilience with energy efficiency is challenging, as efforts to improve one can harm the other. This paper presents a method to enhance disaster survivability in microservice architectures, particularly those using Kubernetes in cloud-based environments, focusing on optimizing electrical energy use. Aiming to save energy, our work adopt the consolidation strategy that means grouping multiple microservices on a single host. Our aproach uses a widely adopted analytical model, the Generalized Stochastic Petri Net (GSPN). GSPN are a powerful modeling technique that is widely used in various fields, including engineering, computer science, and operations research. One of the primary advantages of GSPN is its ability to model complex systems with a high degree of accuracy. Additionally, GSPN allows for the modeling of both logical and stochastic behavior, making it ideal for systems that involve a combination of both. Our GSPN models compute a number of metrics such as: recovery time, system availability, reliability, Mean Time to Failure, and the configuration of cloud-based microservices. We compared our approach against others focusing on survivability or efficiency. Our approach aligns with Recovery Time Objectives during sudden disasters and offers the fastest recovery, requiring 9% less warning time to fully recover in cases of disaster with alert when compared to strategies with similar electrical consumption. It also saves about 27% energy compared to low consolidation strategies and 5% against high consolidation under static conditions.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"9 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141509694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quickcent: a fast and frugal heuristic for harmonic centrality estimation on scale-free networks Quickcent:无标度网络谐波中心性估算的快速节俭启发式方法
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-08 DOI: 10.1007/s00607-024-01303-z
Francisco Plana, Andrés Abeliuk, Jorge Pérez

We present a simple and quick method to approximate network centrality indexes. Our approach, called QuickCent, is inspired by so-called fast and frugal heuristics, which are heuristics initially proposed to model some human decision and inference processes. The centrality index that we estimate is the harmonic centrality, which is a measure based on shortest-path distances, so infeasible to compute on large networks. We compare QuickCent with known machine learning algorithms on synthetic network datasets, and some empirical networks. Our experiments show that QuickCent can make estimates that are competitive in accuracy with the best alternative methods tested, either on synthetic scale-free networks or empirical networks. QuickCent has the feature of achieving low error variance estimates, even with a small training set. Moreover, QuickCent is comparable in efficiency—accuracy and time cost—to more complex methods. We discuss and provide some insight into how QuickCent exploits the fact that in some networks, such as those generated by preferential attachment, local density measures such as the in-degree, can be a good proxy for the size of the network region to which a node has access, opening up the possibility of approximating expensive indices based on size such as the harmonic centrality. This same fact may explain some evidence we provide that QuickCent would have a superior performance on empirical information networks, such as citations or the internet. Our initial results show that simple heuristics are a promising line of research in the context of network measure estimations.

我们提出了一种近似网络中心性指数的简单快速方法。我们的方法被称为 QuickCent,其灵感来源于所谓的快速和节俭启发式方法,这些启发式方法最初是为了模拟某些人类决策和推理过程而提出的。我们估算的中心性指数是谐波中心性,它是一种基于最短路径距离的度量,因此在大型网络中计算并不可行。我们在合成网络数据集和一些经验网络上将 QuickCent 与已知的机器学习算法进行了比较。实验结果表明,无论是在合成无标度网络还是在经验网络上,QuickCent 的估计值在准确性上都能与测试过的最佳替代方法相媲美。QuickCent 具有误差方差估计值低的特点,即使训练集很小。此外,QuickCent 在效率--准确性和时间成本方面与更复杂的方法不相上下。我们讨论了 QuickCent 如何利用以下事实并提出了一些见解:在某些网络中,例如由优先附着产生的网络,内度等局部密度度量可以很好地代表节点所能访问的网络区域的大小,从而为基于大小的近似昂贵指数(如谐波中心性)提供了可能性。同样的事实也可以解释我们所提供的一些证据,即 QuickCent 在经验信息网络(如引用或互联网)中具有更优越的性能。我们的初步结果表明,在网络度量估计方面,简单的启发式方法是一个很有前途的研究方向。
{"title":"Quickcent: a fast and frugal heuristic for harmonic centrality estimation on scale-free networks","authors":"Francisco Plana, Andrés Abeliuk, Jorge Pérez","doi":"10.1007/s00607-024-01303-z","DOIUrl":"https://doi.org/10.1007/s00607-024-01303-z","url":null,"abstract":"<p>We present a simple and quick method to approximate network centrality indexes. Our approach, called <i>QuickCent</i>, is inspired by so-called <i>fast and frugal</i> heuristics, which are heuristics initially proposed to model some human decision and inference processes. The centrality index that we estimate is the <i>harmonic</i> centrality, which is a measure based on shortest-path distances, so infeasible to compute on large networks. We compare <i>QuickCent</i> with known machine learning algorithms on synthetic network datasets, and some empirical networks. Our experiments show that <i>QuickCent</i> can make estimates that are competitive in accuracy with the best alternative methods tested, either on synthetic scale-free networks or empirical networks. QuickCent has the feature of achieving low error variance estimates, even with a small training set. Moreover, <i>QuickCent</i> is comparable in efficiency—accuracy and time cost—to more complex methods. We discuss and provide some insight into how QuickCent exploits the fact that in some networks, such as those generated by preferential attachment, local density measures such as the in-degree, can be a good proxy for the size of the network region to which a node has access, opening up the possibility of approximating expensive indices based on size such as the harmonic centrality. This same fact may explain some evidence we provide that QuickCent would have a superior performance on empirical information networks, such as citations or the internet. Our initial results show that simple heuristics are a promising line of research in the context of network measure estimations.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"19 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141509768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An association rule mining-oriented approach for prioritizing functional requirements 以关联规则挖掘为导向的功能需求优先排序方法
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-31 DOI: 10.1007/s00607-024-01296-9
Habib Un Nisa, Saif Ur Rehman Khan, Shahid Hussain, Wen-Li Wang

Software requirements play a vital role in ensuring a software product’s success. However, it remains a challenging task to implement all of the user requirements, especially in a resource-constrained development environment. To deal with this situation, a requirements prioritization (RP) process can help determine the sequence for the user requirements to be implemented. However, existing RP techniques are suffered from some major challenges such as lack of automation, excessive effort, and reliance on stakeholders’ involvement to initiate the process. This study intends to propose an automated requirements prioritization approach called association rule mining-oriented (ARMO) to address these challenges. The automation process of the ARMO approach incorporates activities to first pre-process the requirements description and extract features. The features are then examined and analyzed through the applied rule mining technique to prioritize the requirements automatically and efficiently without the involvement of stakeholders. In this work, an evaluation model was further developed to assess the effectiveness of the proposed ARMO approach. To validate the efficacy of ARMO approach, a case study was conducted on real-world software projects grounded on the accuracy, precision, recall, and f1-score measures. The promising experimental results demonstrate the ability of the proposed approach to prioritize user requirements. The proposed approach can successfully prioritize user requirements automatically without requiring a significant amount of effort and stakeholders’ involvement to initiate the RP process.

软件需求对确保软件产品的成功起着至关重要的作用。然而,要实现所有用户需求仍是一项具有挑战性的任务,尤其是在资源有限的开发环境中。为了应对这种情况,需求优先级排序(RP)流程可以帮助确定用户需求的实施顺序。然而,现有的需求优先级排序(RP)技术面临着一些主要挑战,如缺乏自动化、工作量过大以及依赖利益相关者的参与来启动流程等。本研究打算提出一种称为面向关联规则挖掘(ARMO)的自动化需求优先级排序方法来应对这些挑战。ARMO 方法的自动化流程包括首先预处理需求描述和提取特征的活动。然后,通过应用规则挖掘技术对这些特征进行检查和分析,从而在没有利益相关者参与的情况下自动、高效地确定需求的优先级。在这项工作中,进一步开发了一个评估模型,以评估所提出的 ARMO 方法的有效性。为了验证 ARMO 方法的有效性,基于准确度、精确度、召回率和 f1 分数等指标,对真实世界的软件项目进行了案例研究。令人鼓舞的实验结果证明了所提出的方法有能力对用户需求进行优先排序。建议的方法可以成功地自动排列用户需求的优先级,而不需要大量的努力和利益相关者的参与来启动 RP 流程。
{"title":"An association rule mining-oriented approach for prioritizing functional requirements","authors":"Habib Un Nisa, Saif Ur Rehman Khan, Shahid Hussain, Wen-Li Wang","doi":"10.1007/s00607-024-01296-9","DOIUrl":"https://doi.org/10.1007/s00607-024-01296-9","url":null,"abstract":"<p>Software requirements play a vital role in ensuring a software product’s success. However, it remains a challenging task to implement all of the user requirements, especially in a resource-constrained development environment. To deal with this situation, a requirements prioritization (RP) process can help determine the sequence for the user requirements to be implemented. However, existing RP techniques are suffered from some major challenges such as lack of automation, excessive effort, and reliance on stakeholders’ involvement to initiate the process. This study intends to propose an automated requirements prioritization approach called association rule mining-oriented (ARMO) to address these challenges. The automation process of the ARMO approach incorporates activities to first pre-process the requirements description and extract features. The features are then examined and analyzed through the applied rule mining technique to prioritize the requirements automatically and efficiently without the involvement of stakeholders. In this work, an evaluation model was further developed to assess the effectiveness of the proposed ARMO approach. To validate the efficacy of ARMO approach, a case study was conducted on real-world software projects grounded on the accuracy, precision, recall, and f1-score measures. The promising experimental results demonstrate the ability of the proposed approach to prioritize user requirements. The proposed approach can successfully prioritize user requirements automatically without requiring a significant amount of effort and stakeholders’ involvement to initiate the RP process.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"433 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141189452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-label learning for identifying co-occurring class code smells 识别共现类代码气味的多标签学习
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-27 DOI: 10.1007/s00607-024-01294-x
Mouna Hadj-Kacem, Nadia Bouassida

Code smell identification is crucial in software maintenance. The existing literature mostly focuses on single code smell identification. However, in practice, a software artefact typically exhibits multiple code smells simultaneously where their diffuseness has been assessed, suggesting that 59% of smelly classes are affected by more than one smell. So to meet this complexity found in real-world projects, we propose a multi-label learning-based approach to identify eight code smells at the class-level, i.e. the most sever software artefacts that need to be prioritized in the refactoring process. In our experiments, we have used 12 algorithms from different multi-label learning methods across 30 open-source Java projects, where significant findings have been presented. We have explored co-occurrences between class code smells and examined the impact of correlations on prediction results. Additionally, we assess multi-label learning methods to compare data adaptation versus algorithm adaptation. Our findings highlight the effectiveness of the Ensemble of Classifier Chains and Binary Relevance in achieving high-performance results.

代码气味识别对软件维护至关重要。现有文献大多侧重于单一代码气味的识别。然而,在实践中,软件工件通常会同时表现出多种代码气味,其扩散性已得到评估,表明 59% 的气味类受到不止一种气味的影响。因此,为了应对现实世界项目中的这种复杂性,我们提出了一种基于多标签学习的方法,用于识别类级的八种代码气味,即在重构过程中需要优先处理的最严重的软件构件。在实验中,我们在 30 个开源 Java 项目中使用了来自不同多标签学习方法的 12 种算法,并取得了重大发现。我们探索了类代码气味之间的共现关系,并研究了相关性对预测结果的影响。此外,我们还评估了多标签学习方法,以比较数据适应性与算法适应性。我们的研究结果凸显了分类器链组合和二元相关性在实现高性能结果方面的有效性。
{"title":"Multi-label learning for identifying co-occurring class code smells","authors":"Mouna Hadj-Kacem, Nadia Bouassida","doi":"10.1007/s00607-024-01294-x","DOIUrl":"https://doi.org/10.1007/s00607-024-01294-x","url":null,"abstract":"<p>Code smell identification is crucial in software maintenance. The existing literature mostly focuses on single code smell identification. However, in practice, a software artefact typically exhibits multiple code smells simultaneously where their diffuseness has been assessed, suggesting that 59% of smelly classes are affected by more than one smell. So to meet this complexity found in real-world projects, we propose a multi-label learning-based approach to identify eight code smells at the class-level, i.e. the most sever software artefacts that need to be prioritized in the refactoring process. In our experiments, we have used 12 algorithms from different multi-label learning methods across 30 open-source Java projects, where significant findings have been presented. We have explored co-occurrences between class code smells and examined the impact of correlations on prediction results. Additionally, we assess multi-label learning methods to compare data adaptation versus algorithm adaptation. Our findings highlight the effectiveness of the Ensemble of Classifier Chains and Binary Relevance in achieving high-performance results.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"23 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141171585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel bidirectional LSTM model for network intrusion detection in SDN-IoT network 用于 SDN-IoT 网络入侵检测的新型双向 LSTM 模型
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-27 DOI: 10.1007/s00607-024-01295-w
G. Sri vidhya, R. Nagarajan

The advancement of technology allows for easy adaptability with IoT devices. Internet of Things (IoT) devices can interact without human intervention, which leads to the creation of smart cities. Nevertheless, security concerns persist within IoT networks. To address this, Software Defined Networking (SDN) has been introduced as a centrally controlled network that can solve security issues in IoT devices. Although there is a security concern with integrating SDN and IoT, it specifically targets Distributed Denial of Service (DDoS) attacks. These attacks focus on the network controller since it is centrally controlled. Real-time, high-performance, and precise solutions are necessary to tackle this issue effectively. In recent years, there has been a growing interest in using intelligent deep learning techniques in Network Intrusion Detection Systems (NIDS) through a Software-Defined IoT network (SDN-IoT). The concept of a Wireless Network Intrusion Detection System (WNIDS) aims to create an SDN controller that efficiently monitors and manages smart IoT devices. The proposed WNIDS method analyzes the CSE-CIC-IDS2018 and SDN-IoT datasets to detect and categorize intrusions or attacks in the SDN-IoT network. Implementing a deep learning method called Bidirectional LSTM (BiLSTM)--based WNIDS model effectively detects intrusions in the SDN-IoT network. This model has achieved impressive accuracy rates of 99.97% and 99.96% for binary and multi-class classification using the CSE-CIC-IDS2018 dataset. Similarly, with the SDN-IoT dataset, the model has achieved 95.13% accuracy for binary classification and 92.90% accuracy for multi-class classification, showing superior performance in both datasets.

技术的进步使物联网设备的适应性变得非常容易。物联网(IoT)设备可以在没有人工干预的情况下进行交互,从而创建智能城市。然而,物联网网络的安全问题依然存在。为了解决这个问题,人们引入了软件定义网络(SDN),作为一种集中控制的网络,它可以解决物联网设备的安全问题。虽然集成 SDN 和物联网存在安全问题,但它特别针对分布式拒绝服务(DDoS)攻击。这些攻击主要针对网络控制器,因为它是集中控制的。要有效解决这一问题,就需要实时、高性能和精确的解决方案。近年来,人们越来越关注通过软件定义物联网网络(SDN-IoT)在网络入侵检测系统(NIDS)中使用智能深度学习技术。无线网络入侵检测系统(WNIDS)的概念旨在创建一个能有效监控和管理智能物联网设备的 SDN 控制器。所提出的 WNIDS 方法分析了 CSE-CIC-IDS2018 和 SDN-IoT 数据集,以检测和分类 SDN-IoT 网络中的入侵或攻击。基于双向 LSTM(BiLSTM)的 WNIDS 模型采用深度学习方法,能有效检测 SDN-IoT 网络中的入侵。利用 CSE-CIC-IDS2018 数据集,该模型的二元分类和多类分类准确率分别达到 99.97% 和 99.96%,令人印象深刻。同样,在 SDN-IoT 数据集上,该模型的二元分类准确率达到 95.13%,多类分类准确率达到 92.90%,在这两个数据集上都表现出卓越的性能。
{"title":"A novel bidirectional LSTM model for network intrusion detection in SDN-IoT network","authors":"G. Sri vidhya, R. Nagarajan","doi":"10.1007/s00607-024-01295-w","DOIUrl":"https://doi.org/10.1007/s00607-024-01295-w","url":null,"abstract":"<p>The advancement of technology allows for easy adaptability with IoT devices. Internet of Things (IoT) devices can interact without human intervention, which leads to the creation of smart cities. Nevertheless, security concerns persist within IoT networks. To address this, Software Defined Networking (SDN) has been introduced as a centrally controlled network that can solve security issues in IoT devices. Although there is a security concern with integrating SDN and IoT, it specifically targets Distributed Denial of Service (DDoS) attacks. These attacks focus on the network controller since it is centrally controlled. Real-time, high-performance, and precise solutions are necessary to tackle this issue effectively. In recent years, there has been a growing interest in using intelligent deep learning techniques in Network Intrusion Detection Systems (NIDS) through a Software-Defined IoT network (SDN-IoT). The concept of a Wireless Network Intrusion Detection System (WNIDS) aims to create an SDN controller that efficiently monitors and manages smart IoT devices. The proposed WNIDS method analyzes the CSE-CIC-IDS2018 and SDN-IoT datasets to detect and categorize intrusions or attacks in the SDN-IoT network. Implementing a deep learning method called Bidirectional LSTM (BiLSTM)--based WNIDS model effectively detects intrusions in the SDN-IoT network. This model has achieved impressive accuracy rates of 99.97% and 99.96% for binary and multi-class classification using the CSE-CIC-IDS2018 dataset. Similarly, with the SDN-IoT dataset, the model has achieved 95.13% accuracy for binary classification and 92.90% accuracy for multi-class classification, showing superior performance in both datasets.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"7 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141171512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data management and selectivity in collaborative pervasive edge computing 协作式普适边缘计算中的数据管理和选择性
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-27 DOI: 10.1007/s00607-024-01297-8
Dimitrios Papathanasiou, Kostas Kolomvatsos

Context-aware data management becomes the focus of several research efforts, which can be placed at the intersection between the Internet of Things (IoT) and Edge Computing (EC). Huge volumes of data captured by IoT devices are processed in EC environments. Even if edge nodes undertake the responsibility of data management tasks, they are characterized by limited storage and computational resources compared to Cloud. Apparently, this mobilises the introduction of intelligent data selection methods capable of deciding which of the collected data should be kept locally based on end users/applications requests. In this paper, we devise a mechanism where edge nodes learn their own data selection filters, and decide the distributed allocation of newly collected data to their peers and/or Cloud once these data are not conformed with the local data filters. Our mechanism intents to postpone final decisions on data transfer to Cloud (e.g., data centers) to pervasively keep relevant data as close and as long to end users/applications as possible. The proposed mechanism derives a data-selection map across edge nodes by learning specific data sub-spaces, which facilitate the placement of processing tasks (e.g., analytics queries). This is very critical when we target to support near real time decision making and would like to minimize all parts of the tasks allocation procedure. We evaluate and compare our approach against baselines and schemes found in the literature showcasing its applicability in pervasive edge computing environments.

情境感知数据管理已成为多项研究工作的重点,可将其置于物联网(IoT)和边缘计算(EC)之间的交叉点。物联网设备捕获的大量数据会在 EC 环境中进行处理。即使边缘节点承担了数据管理任务,但与云计算相比,它们的存储和计算资源有限。显然,这就需要引入智能数据选择方法,能够根据终端用户/应用程序的要求决定哪些收集到的数据应保存在本地。在本文中,我们设计了一种机制,让边缘节点学习自己的数据选择过滤器,并在新收集的数据不符合本地数据过滤器时,决定将这些数据分布式地分配给对等节点和/或云。我们的机制旨在推迟将数据传输到云(如数据中心)的最终决定,从而使相关数据尽可能接近终端用户/应用,并尽可能长时间地保存在终端用户/应用中。所提出的机制通过学习特定的数据子空间,在边缘节点上生成数据选择图,从而促进处理任务(如分析查询)的放置。当我们以支持近乎实时的决策为目标,并希望尽量减少任务分配过程中的所有环节时,这一点非常关键。我们评估并比较了我们的方法与文献中的基线和方案,展示了它在普适边缘计算环境中的适用性。
{"title":"Data management and selectivity in collaborative pervasive edge computing","authors":"Dimitrios Papathanasiou, Kostas Kolomvatsos","doi":"10.1007/s00607-024-01297-8","DOIUrl":"https://doi.org/10.1007/s00607-024-01297-8","url":null,"abstract":"<p>Context-aware data management becomes the focus of several research efforts, which can be placed at the intersection between the Internet of Things (IoT) and Edge Computing (EC). Huge volumes of data captured by IoT devices are processed in EC environments. Even if edge nodes undertake the responsibility of data management tasks, they are characterized by limited storage and computational resources compared to Cloud. Apparently, this mobilises the introduction of intelligent data selection methods capable of deciding which of the collected data should be kept locally based on end users/applications requests. In this paper, we devise a mechanism where edge nodes learn their own data selection filters, and decide the distributed allocation of newly collected data to their peers and/or Cloud once these data are not conformed with the local data filters. Our mechanism intents to postpone final decisions on data transfer to Cloud (e.g., data centers) to pervasively keep relevant data as close and as long to end users/applications as possible. The proposed mechanism derives a data-selection map across edge nodes by learning specific data sub-spaces, which facilitate the placement of processing tasks (e.g., analytics queries). This is very critical when we target to support near real time decision making and would like to minimize all parts of the tasks allocation procedure. We evaluate and compare our approach against baselines and schemes found in the literature showcasing its applicability in pervasive edge computing environments.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"31 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141171578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentially private federated learning with non-IID data 非 IID 数据的差异化私有联合学习
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-08 DOI: 10.1007/s00607-024-01257-2
Shuyan Cheng, Peng Li, Ruchuan Wang, He Xu

In Differentially Private Federated Learning (DPFL), gradient clipping and random noise addition disproportionately affect statistically heterogeneous data. As a consequence, DPFL has a disparate impact: the accuracy of models trained with DPFL tends to decrease more on these data. If the accuracy of the original model decreases on heterogeneous data, DPFL may degrade the accuracy performance more. In this work, we study the utility loss inequality due to differential privacy and compare the convergence of the private and non-private models. Specifically, we analyze the gradient differences caused by statistically heterogeneous data and explain how statistical heterogeneity relates to the effect of privacy on model convergence. In addition, we propose an improved DPFL algorithm, called R-DPFL, to achieve differential privacy at the same cost but with good utility. R-DPFL adjusts the gradient clipping value and the number of selected users at beginning according to the degree of statistical heterogeneity of the data, and weakens the direct proportional relationship between the differential privacy and the gradient difference, thereby reducing the impact of differential privacy on the model trained on heterogeneous data. Our experimental evaluation shows the effectiveness of our elimination algorithm in achieving the same cost of differential privacy with satisfactory utility. Our code is publicly available at https://github.com/chengshuyan/R-DPFL.

在差分私有联合学习(DPFL)中,梯度剪切和随机噪声添加会对统计异质数据产生不成比例的影响。因此,DPFL 会产生不同的影响:在这些数据上,使用 DPFL 训练的模型的准确性往往会下降更多。如果原始模型的准确度在异构数据上下降,DPFL 可能会使准确度性能下降更多。在这项工作中,我们研究了差异隐私导致的效用损失不等式,并比较了隐私模型和非隐私模型的收敛性。具体来说,我们分析了统计异质性数据造成的梯度差异,并解释了统计异质性与隐私对模型收敛性的影响之间的关系。此外,我们还提出了一种改进的 DPFL 算法,称为 R-DPFL,以相同的成本实现不同的隐私性,但具有良好的效用。R-DPFL 根据数据的统计异质性程度调整梯度剪切值和开始时选择的用户数量,弱化了差分隐私与梯度差之间的正比关系,从而降低了差分隐私对在异质性数据上训练的模型的影响。我们的实验评估表明,我们的消除算法在实现相同的差分隐私成本时非常有效,而且效果令人满意。我们的代码可在 https://github.com/chengshuyan/R-DPFL 公开获取。
{"title":"Differentially private federated learning with non-IID data","authors":"Shuyan Cheng, Peng Li, Ruchuan Wang, He Xu","doi":"10.1007/s00607-024-01257-2","DOIUrl":"https://doi.org/10.1007/s00607-024-01257-2","url":null,"abstract":"<p>In Differentially Private Federated Learning (DPFL), gradient clipping and random noise addition disproportionately affect statistically heterogeneous data. As a consequence, DPFL has a disparate impact: the accuracy of models trained with DPFL tends to decrease more on these data. If the accuracy of the original model decreases on heterogeneous data, DPFL may degrade the accuracy performance more. In this work, we study the utility loss inequality due to differential privacy and compare the convergence of the private and non-private models. Specifically, we analyze the gradient differences caused by statistically heterogeneous data and explain how statistical heterogeneity relates to the effect of privacy on model convergence. In addition, we propose an improved DPFL algorithm, called R-DPFL, to achieve differential privacy at the same cost but with good utility. R-DPFL adjusts the gradient clipping value and the number of selected users at beginning according to the degree of statistical heterogeneity of the data, and weakens the direct proportional relationship between the differential privacy and the gradient difference, thereby reducing the impact of differential privacy on the model trained on heterogeneous data. Our experimental evaluation shows the effectiveness of our elimination algorithm in achieving the same cost of differential privacy with satisfactory utility. Our code is publicly available at https://github.com/chengshuyan/R-DPFL.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"20 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140942541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems 为支持物联网技术的智能医疗系统提供安全的隐私增强型快速身份验证和密钥管理
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-05-07 DOI: 10.1007/s00607-024-01291-0
Sriramulu Bojjagani, Denslin Brabin, Kalai Kumar, Neeraj Kumar Sharma, Umamaheswararao Batta

The smart healthcare system advancements have introduced the Internet of Things, enabling technologies to improve the quality of medical services. The main idea of these healthcare systems is to provide data security, interaction between entities, efficient data transfer, and sustainability. However, privacy concerning patient information is a fundamental problem in smart healthcare systems. Many authentications and critical management protocols exist in the literature for healthcare systems, but ensuring security still needs to be improved. Even if security is achieved, it still requires fast communication and computations. In this paper, we have introduced a new secure privacy-enhanced fast authentication key management scheme that effectively applies to lightweight resource-constrained devices in healthcare systems to overcome the issue. The proposed framework is applicable for quick authentication, efficient key management between the entities, and minimising computation and communication overheads. We verified our proposed framework with formal and informal verification using BAN logic, Scyther simulation, and the Drozer tool. The simulation and tool verification shows that the proposed system is free from well-known attacks, reducing communication and computation costs compared to the existing healthcare systems.

智能医疗系统的进步引入了物联网,使技术能够提高医疗服务的质量。这些医疗系统的主要理念是提供数据安全、实体间互动、高效数据传输和可持续性。然而,患者信息隐私是智能医疗系统的一个基本问题。文献中有许多关于医疗保健系统的认证和关键管理协议,但确保安全性仍有待改进。即使实现了安全性,仍需要快速通信和计算。在本文中,我们介绍了一种新的安全隐私增强型快速认证密钥管理方案,它能有效地应用于医疗保健系统中的轻量级资源受限设备,以克服这一问题。所提出的框架适用于快速身份验证、实体间的高效密钥管理以及计算和通信开销最小化。我们使用 BAN 逻辑、Scyther 仿真和 Drozer 工具,通过正式和非正式验证来验证我们提出的框架。仿真和工具验证结果表明,与现有的医疗保健系统相比,所提出的系统不会受到众所周知的攻击,还能降低通信和计算成本。
{"title":"Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems","authors":"Sriramulu Bojjagani, Denslin Brabin, Kalai Kumar, Neeraj Kumar Sharma, Umamaheswararao Batta","doi":"10.1007/s00607-024-01291-0","DOIUrl":"https://doi.org/10.1007/s00607-024-01291-0","url":null,"abstract":"<p>The smart healthcare system advancements have introduced the Internet of Things, enabling technologies to improve the quality of medical services. The main idea of these healthcare systems is to provide data security, interaction between entities, efficient data transfer, and sustainability. However, privacy concerning patient information is a fundamental problem in smart healthcare systems. Many authentications and critical management protocols exist in the literature for healthcare systems, but ensuring security still needs to be improved. Even if security is achieved, it still requires fast communication and computations. In this paper, we have introduced a new secure privacy-enhanced fast authentication key management scheme that effectively applies to lightweight resource-constrained devices in healthcare systems to overcome the issue. The proposed framework is applicable for quick authentication, efficient key management between the entities, and minimising computation and communication overheads. We verified our proposed framework with formal and informal verification using BAN logic, Scyther simulation, and the Drozer tool. The simulation and tool verification shows that the proposed system is free from well-known attacks, reducing communication and computation costs compared to the existing healthcare systems.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"352 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140941987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1