首页 > 最新文献

Computing最新文献

英文 中文
Cloud storage tier optimization through storage object classification 通过存储对象分类优化云存储层
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-04-03 DOI: 10.1007/s00607-024-01281-2

Abstract

Cloud storage adoption has increased over the years given the high demand for fast processing, low access latency, and ever-increasing amount of data being generated by, e.g., Internet of Things applications. In order to meet the users’ demands and provide a cost-effective solution, cloud service providers offer tiered storage; however, keeping the data in one tier is not cost-effective. In this respect, cloud storage tier optimization involves aligning data storage needs with the most suitable and cost-effective storage tier, thus reducing costs while ensuring data availability and meeting performance requirements. Ideally, this process considers the trade-off between performance and cost, as different storage tiers offer different levels of performance and durability. It also encompasses data lifecycle management, where data is automatically moved between tiers based on access patterns, which in turn impacts the storage cost. In this respect, this article explores two novel classification approaches, rule-based and game theory-based, to optimize cloud storage cost by reassigning data between different storage tiers. Four distinct storage tiers are considered: premium, hot, cold, and archive. The viability and potential of the proposed approaches are demonstrated by comparing cost savings and analyzing the computational cost using both fully-synthetic and semi-synthetic datasets with static and dynamic access patterns. The results indicate that the proposed approaches have the potential to significantly reduce cloud storage cost, while being computationally feasible for practical applications. Both approaches are lightweight and industry- and platform-independent.

摘要 近年来,由于对快速处理、低访问延迟的高要求,以及物联网应用等产生的数据量不断增加,云存储的采用率越来越高。为了满足用户的需求并提供具有成本效益的解决方案,云服务提供商提供了分层存储;但是,将数据保留在一个层级中并不具有成本效益。在这方面,云存储层优化涉及将数据存储需求与最合适、最具成本效益的存储层相匹配,从而在降低成本的同时确保数据可用性并满足性能要求。理想情况下,这一过程会考虑性能和成本之间的权衡,因为不同的存储层提供不同级别的性能和耐用性。它还包括数据生命周期管理,即根据访问模式在层级之间自动移动数据,这反过来又会影响存储成本。在这方面,本文探讨了基于规则和基于博弈论的两种新型分类方法,通过在不同存储层之间重新分配数据来优化云存储成本。本文考虑了四个不同的存储层:高级存储层、热存储层、冷存储层和归档存储层。通过使用静态和动态访问模式的全合成和半合成数据集,比较节省的成本并分析计算成本,证明了所提方法的可行性和潜力。结果表明,所提出的方法具有显著降低云存储成本的潜力,同时在实际应用中具有计算可行性。这两种方法都是轻量级的,不受行业和平台的限制。
{"title":"Cloud storage tier optimization through storage object classification","authors":"","doi":"10.1007/s00607-024-01281-2","DOIUrl":"https://doi.org/10.1007/s00607-024-01281-2","url":null,"abstract":"<h3>Abstract</h3> <p>Cloud storage adoption has increased over the years given the high demand for fast processing, low access latency, and ever-increasing amount of data being generated by, e.g., Internet of Things applications. In order to meet the users’ demands and provide a cost-effective solution, cloud service providers offer tiered storage; however, keeping the data in one tier is not cost-effective. In this respect, cloud storage tier optimization involves aligning data storage needs with the most suitable and cost-effective storage tier, thus reducing costs while ensuring data availability and meeting performance requirements. Ideally, this process considers the trade-off between performance and cost, as different storage tiers offer different levels of performance and durability. It also encompasses data lifecycle management, where data is automatically moved between tiers based on access patterns, which in turn impacts the storage cost. In this respect, this article explores two novel classification approaches, rule-based and game theory-based, to optimize cloud storage cost by reassigning data between different storage tiers. Four distinct storage tiers are considered: premium, hot, cold, and archive. The viability and potential of the proposed approaches are demonstrated by comparing cost savings and analyzing the computational cost using both fully-synthetic and semi-synthetic datasets with static and dynamic access patterns. The results indicate that the proposed approaches have the potential to significantly reduce cloud storage cost, while being computationally feasible for practical applications. Both approaches are lightweight and industry- and platform-independent.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"41 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140560930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unraveling human social behavior motivations via inverse reinforcement learning-based link prediction 通过基于反强化学习的链接预测揭示人类社会行为动机
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-04-02 DOI: 10.1007/s00607-024-01279-w
Xin Jiang, Hongbo Liu, Liping Yang, Bo Zhang, Tomas E. Ward, Václav Snášel

Link prediction aims to capture the evolution of network structure, especially in real social networks, which is conducive to friend recommendations, human contact trajectory simulation, and more. However, the challenge of the stochastic social behaviors and the unstable space-time distribution in such networks often leads to unexplainable and inaccurate link predictions. Therefore, taking inspiration from the success of imitation learning in simulating human driver behavior, we propose a dynamic network link prediction method based on inverse reinforcement learning (DN-IRL) to unravel the motivations behind social behaviors in social networks. Specifically, the historical social behaviors (link sequences) and a next behavior (a single link) are regarded as the current environmental state and the action taken by the agent, respectively. Subsequently, the reward function, which is designed to maximize the cumulative expected reward from expert behaviors in the raw data, is optimized and utilized to learn the agent’s social policy. Furthermore, our approach incorporates the neighborhood structure based node embedding and the self-attention modules, enabling sensitivity to network structure and traceability to predicted links. Experimental results on real-world dynamic social networks demonstrate that DN-IRL achieves more accurate and explainable of prediction compared to the baselines.

链接预测旨在捕捉网络结构的演变,尤其是在真实社交网络中,这有利于好友推荐、人际接触轨迹模拟等。然而,这类网络中的随机社交行为和不稳定的时空分布往往会导致无法解释和不准确的链接预测。因此,我们从模仿学习在模拟人类驾驶行为方面的成功经验中得到启发,提出了一种基于逆强化学习(DN-IRL)的动态网络链接预测方法,以揭示社交网络中社交行为背后的动机。具体来说,历史社交行为(链接序列)和下一个行为(单个链接)分别被视为当前环境状态和代理采取的行动。随后,我们会优化奖励函数,使原始数据中专家行为的累积预期奖励最大化,并利用奖励函数来学习代理的社交策略。此外,我们的方法还结合了基于邻域结构的节点嵌入和自我关注模块,从而实现了对网络结构的敏感性和对预测链接的可追溯性。在真实世界动态社交网络上的实验结果表明,与基线方法相比,DN-IRL 的预测更准确、更可解释。
{"title":"Unraveling human social behavior motivations via inverse reinforcement learning-based link prediction","authors":"Xin Jiang, Hongbo Liu, Liping Yang, Bo Zhang, Tomas E. Ward, Václav Snášel","doi":"10.1007/s00607-024-01279-w","DOIUrl":"https://doi.org/10.1007/s00607-024-01279-w","url":null,"abstract":"<p>Link prediction aims to capture the evolution of network structure, especially in real social networks, which is conducive to friend recommendations, human contact trajectory simulation, and more. However, the challenge of the stochastic social behaviors and the unstable space-time distribution in such networks often leads to unexplainable and inaccurate link predictions. Therefore, taking inspiration from the success of imitation learning in simulating human driver behavior, we propose a dynamic network link prediction method based on inverse reinforcement learning (DN-IRL) to unravel the motivations behind social behaviors in social networks. Specifically, the historical social behaviors (link sequences) and a next behavior (a single link) are regarded as the current environmental state and the action taken by the agent, respectively. Subsequently, the reward function, which is designed to maximize the cumulative expected reward from expert behaviors in the raw data, is optimized and utilized to learn the agent’s social policy. Furthermore, our approach incorporates the neighborhood structure based node embedding and the self-attention modules, enabling sensitivity to network structure and traceability to predicted links. Experimental results on real-world dynamic social networks demonstrate that DN-IRL achieves more accurate and explainable of prediction compared to the baselines.\u0000</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"1 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140560935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Person re-identification method based on fine-grained feature fusion and self-attention mechanism 基于细粒度特征融合和自我关注机制的人员再识别方法
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-25 DOI: 10.1007/s00607-024-01270-5
Kangning Yin, Zhen Ding, Zhihua Dong, Xinhui Ji, Zhipei Wang, Dongsheng Chen, Ye Li, Guangqiang Yin, Zhiguo Wang

Aiming at the problem of low accuracy of person re-identification (Re-ID) algorithm caused by occlusion, low distinctiveness of person features and unclear detail features in complex environment, we propose a Re-ID method based on fine-grained feature fusion and self-attention mechanism. First, we design a dilated non-local module (DNLM), which combines dilated convolution with the non-local module and embeds it between layers of the backbone network, enhancing the self-attention and receptive field of the model and improving the performance on occlusion tasks. Second, the fine-grained feature fusion screening module (3FSM) is improved based on the outlook attention module, which can realize adaptive feature selection and enhance the recognition ability to similar samples of the model. Finally, combined with the feature pyramid in the field of object detection, we propose a multi-scale feature fusion pyramid (MFFP) to improve the Re-ID tasks, in which we use different levels of features to perform feature enhancement. Ablation and comprehensive experiment results based on multiple datasets validate the effectiveness of our proposal. The mean Average Precision (mAP) of Market1501 and DukeMTMC-reID is 92.5 and 87.7%, and Rank-1 is 95.1 and 91.1% respectively. Compared with the current mainstream Re-ID algorithm, our method has excellent Re-ID performance.

针对复杂环境中由于遮挡、人像特征不明显、细节特征不清晰等原因造成的人像再识别(Re-ID)算法准确率低的问题,我们提出了一种基于细粒度特征融合和自注意力机制的人像再识别方法。首先,我们设计了稀释非局部模块(DNLM),将稀释卷积与非局部模块相结合,并将其嵌入主干网络各层之间,增强了模型的自注意力和感受野,提高了闭塞任务的性能。其次,在展望注意模块的基础上改进细粒度特征融合筛选模块(3FSM),实现自适应特征选择,增强对模型相似样本的识别能力。最后,结合物体检测领域的特征金字塔,我们提出了多尺度特征融合金字塔(MFFP)来改进 Re-ID 任务,其中我们使用不同层次的特征来进行特征增强。基于多个数据集的消融和综合实验结果验证了我们建议的有效性。Market1501 和 DukeMTMC-reID 的平均精度(mAP)分别为 92.5% 和 87.7%,Rank-1 分别为 95.1% 和 91.1%。与目前主流的 Re-ID 算法相比,我们的方法具有出色的 Re-ID 性能。
{"title":"Person re-identification method based on fine-grained feature fusion and self-attention mechanism","authors":"Kangning Yin, Zhen Ding, Zhihua Dong, Xinhui Ji, Zhipei Wang, Dongsheng Chen, Ye Li, Guangqiang Yin, Zhiguo Wang","doi":"10.1007/s00607-024-01270-5","DOIUrl":"https://doi.org/10.1007/s00607-024-01270-5","url":null,"abstract":"<p>Aiming at the problem of low accuracy of person re-identification (Re-ID) algorithm caused by occlusion, low distinctiveness of person features and unclear detail features in complex environment, we propose a Re-ID method based on fine-grained feature fusion and self-attention mechanism. First, we design a dilated non-local module (DNLM), which combines dilated convolution with the non-local module and embeds it between layers of the backbone network, enhancing the self-attention and receptive field of the model and improving the performance on occlusion tasks. Second, the fine-grained feature fusion screening module (3FSM) is improved based on the outlook attention module, which can realize adaptive feature selection and enhance the recognition ability to similar samples of the model. Finally, combined with the feature pyramid in the field of object detection, we propose a multi-scale feature fusion pyramid (MFFP) to improve the Re-ID tasks, in which we use different levels of features to perform feature enhancement. Ablation and comprehensive experiment results based on multiple datasets validate the effectiveness of our proposal. The mean Average Precision (mAP) of Market1501 and DukeMTMC-reID is 92.5 and 87.7%, and Rank-1 is 95.1 and 91.1% respectively. Compared with the current mainstream Re-ID algorithm, our method has excellent Re-ID performance.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"30 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140300878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network 零信任安全网络中通过深度强化学习(MMODPAD-DRL)进行异常检测的基于 Matyas-Meyer Oseas 的设备剖析技术
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-23 DOI: 10.1007/s00607-024-01269-y
Rajesh Kumar Dhanaraj, Anamika Singh, Anand Nayyar

The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous verification of devices is a time-consuming process and adversely affects the promising nature of the zero-trust model. Every time the node enters, even if the node is a member of the network, authorization of the node is necessary to ensure authenticity. This verification section of zero trust hinders the seamless working of the IIoT infrastructure. Therefore, the main objective of this paper is to propose the solution for the above-mentioned problem by enabling “device profiling” via deep reinforcement learning so that the same device can be identified and permitted access without hindering the working of Industrial Internet of Things infrastructure. The overall proposed approach works in different phases including the compression function for ensuring data confidentiality and integrity, then the device profiling is performed based on the features a device possesses, and lastly, deep reinforcement learning for anomaly detection. To test and validate the proposed approach, extensive experimentations were performed using measures such as false positive rate, data confidentiality rate, data integrity rate, and network access time, and results showed that the proposed technique titled “MMODPAD-DRL” outperforms the existing approaches in false positive rate by 27%, data confidentiality rate by 4% and data integrity rate by 3%, in addition, lessen the network access time by 20%.

在工业物联网(IIoT)中,零信任安全的重要性与日俱增,因为在这个时代存在着注入恶意实体和未经授权的用户拥有设备的巨大风险。现有零信任安全方法的不足之处在于,持续验证设备是一个耗时的过程,对零信任模式的前景产生了不利影响。每次节点进入时,即使节点是网络成员,也必须对节点进行授权,以确保真实性。零信任的这一验证环节阻碍了物联网基础设施的无缝工作。因此,本文的主要目的是针对上述问题提出解决方案,通过深度强化学习实现 "设备剖析",从而在不妨碍工业物联网基础设施工作的情况下识别并允许访问同一设备。所提出的整体方法分不同阶段进行,包括确保数据保密性和完整性的压缩功能,然后根据设备所具备的特征进行设备剖析,最后通过深度强化学习进行异常检测。为了测试和验证所提出的方法,利用误报率、数据保密率、数据完整性率和网络访问时间等指标进行了大量实验,结果表明,所提出的名为 "MMODPAD-DRL "的技术在误报率方面比现有方法高出 27%,在数据保密率方面高出 4%,在数据完整性率方面高出 3%,此外,还将网络访问时间缩短了 20%。
{"title":"Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network","authors":"Rajesh Kumar Dhanaraj, Anamika Singh, Anand Nayyar","doi":"10.1007/s00607-024-01269-y","DOIUrl":"https://doi.org/10.1007/s00607-024-01269-y","url":null,"abstract":"<p>The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing approach of zero trust security is that continuous verification of devices is a time-consuming process and adversely affects the promising nature of the zero-trust model. Every time the node enters, even if the node is a member of the network, authorization of the node is necessary to ensure authenticity. This verification section of zero trust hinders the seamless working of the IIoT infrastructure. Therefore, the main objective of this paper is to propose the solution for the above-mentioned problem by enabling “device profiling” via deep reinforcement learning so that the same device can be identified and permitted access without hindering the working of Industrial Internet of Things infrastructure. The overall proposed approach works in different phases including the compression function for ensuring data confidentiality and integrity, then the device profiling is performed based on the features a device possesses, and lastly, deep reinforcement learning for anomaly detection. To test and validate the proposed approach, extensive experimentations were performed using measures such as false positive rate, data confidentiality rate, data integrity rate, and network access time, and results showed that the proposed technique titled “MMODPAD-DRL” outperforms the existing approaches in false positive rate by 27%, data confidentiality rate by 4% and data integrity rate by 3%, in addition, lessen the network access time by 20%.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"31 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140199123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Categorical learning for automated network traffic categorization for future generation networks in SDN 通过分类学习为 SDN 中的下一代网络自动进行网络流量分类
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-23 DOI: 10.1007/s00607-024-01277-y
Suguna Paramasivam, R. Leela Velusamy, J. V. Nishaanth

Network traffic classification is a fundamental and intricate component of network management in the modern, high-tech era of 5G architectural design, planning of resources, and other areas. Investigation of traffic classification is a key responsibility of traffic engineering in SDN. SDN is a network programmability technology used in 5G networks that divides the control plane from the data plane. It also points the way for autonomous and dynamic network control. SDN needs data from the classification system’s flow statistics to apply the appropriate network flow policies. To control the volume of heterogeneous network traffic data in 5G network service, the network administrator must implement a carefully supervised traffic investigation system. This study uses machine learning techniques to examine alternative ways of handling heterogeneous network traffic. The suggested approach is Ensemble Learning for Automated Network Traffic Categorization. i.e., CatBoosting for Automated network traffic classification for multiclass (Cat-ANTC) predicts traffic categorization and offers a higher prediction accuracy than individual models and a more regularized model formalization to decrease over-fitting and boost efficiency. The Cat-ANTC is evaluated using benchmark network traffic datasets that are openly accessible and contrasted with current classifiers and optimization methods. It is clear that when compared to the currently used ensemble techniques, the suggested ensemble methodology produces promising outcomes. Additionally, the proposed method is tested and shown to perform better than the classification of traffic flow using the current model.

在 5G 架构设计、资源规划等现代高科技时代,网络流量分类是网络管理的基础和复杂组成部分。流量分类调查是 SDN 中流量工程的重要职责。SDN 是一种用于 5G 网络的网络可编程技术,它将控制平面与数据平面划分开来。它还为自主和动态网络控制指明了方向。SDN 需要从分类系统的流量统计中获取数据,以应用适当的网络流量策略。为了控制 5G 网络服务中的异构网络流量数据量,网络管理员必须实施精心监督的流量调查系统。本研究利用机器学习技术研究了处理异构网络流量的其他方法。所建议的方法是用于自动网络流量分类的集合学习(Ensemble Learning for Automated Network Traffic Categorization),即用于多类自动网络流量分类的 CatBoosting(Cat-ANTC)预测流量分类,它比单个模型具有更高的预测准确性,并且具有更正规化的模型形式化以减少过拟合并提高效率。Cat-ANTC 使用可公开访问的基准网络流量数据集进行评估,并与当前的分类器和优化方法进行对比。很明显,与目前使用的集合技术相比,建议的集合方法产生了很好的结果。此外,经测试表明,建议的方法比使用当前模型进行交通流分类的效果更好。
{"title":"Categorical learning for automated network traffic categorization for future generation networks in SDN","authors":"Suguna Paramasivam, R. Leela Velusamy, J. V. Nishaanth","doi":"10.1007/s00607-024-01277-y","DOIUrl":"https://doi.org/10.1007/s00607-024-01277-y","url":null,"abstract":"<p>Network traffic classification is a fundamental and intricate component of network management in the modern, high-tech era of 5G architectural design, planning of resources, and other areas. Investigation of traffic classification is a key responsibility of traffic engineering in SDN. SDN is a network programmability technology used in 5G networks that divides the control plane from the data plane. It also points the way for autonomous and dynamic network control. SDN needs data from the classification system’s flow statistics to apply the appropriate network flow policies. To control the volume of heterogeneous network traffic data in 5G network service, the network administrator must implement a carefully supervised traffic investigation system. This study uses machine learning techniques to examine alternative ways of handling heterogeneous network traffic. The suggested approach is Ensemble Learning for Automated Network Traffic Categorization. i.e., CatBoosting for Automated network traffic classification for multiclass (Cat-ANTC) predicts traffic categorization and offers a higher prediction accuracy than individual models and a more regularized model formalization to decrease over-fitting and boost efficiency. The Cat-ANTC is evaluated using benchmark network traffic datasets that are openly accessible and contrasted with current classifiers and optimization methods. It is clear that when compared to the currently used ensemble techniques, the suggested ensemble methodology produces promising outcomes. Additionally, the proposed method is tested and shown to perform better than the classification of traffic flow using the current model.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"53 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140199339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence maximization in mobile social networks based on RWP-CELF 基于 RWP-CELF 的移动社交网络中的影响力最大化
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-21 DOI: 10.1007/s00607-024-01276-z

Abstract

Influence maximization (IM) problem for messages propagation is an important topic in mobile social networks. The success of the spreading process depends on the mechanism for selection of the influential user. Beside selection of influential users, the computation and running time should be considered in this mechanism to ensure the accurecy and efficient. In this paper, considering that the overhead of exact computation varies nonlinearly with fluctuations in data size, random algorithm with smoother complexity change was designed to solve the IM problem in combination with greedy algorithm. Firstly, we proposed a method named two-hop neighbor network influence estimator to evaluate the influence of all nodes in the two-hop neighbor network. Then, we developed a novel greedy algorithm, the random walk probability cost-effective with lazy-forward (RWP-CELF) algorithm by modifying cost-effective with lazy-forward (CELF) with random algorithm, which uses 25–50 orders of magnitude less time than the state-of-the-art algorithms. We compared the influence spread effect of RWP-CELF on real datasets with a theoretically proven algorithm that is guaranteed to be approximately optimal. Experiments show that the spread effect of RWP-CELF is comparable to this algorithm, and the running time is much lower than this algorithm.

摘要 信息传播的影响力最大化(IM)问题是移动社交网络中的一个重要课题。传播过程的成功与否取决于有影响力用户的选择机制。除了选择有影响力的用户,该机制还需要考虑计算和运行时间,以确保准确性和高效性。本文考虑到精确计算的开销随数据量的波动呈非线性变化,设计了复杂度变化更平滑的随机算法,结合贪婪算法解决 IM 问题。首先,我们提出了一种名为 "两跳邻居网络影响力估计器 "的方法,用于评估两跳邻居网络中所有节点的影响力。然后,我们开发了一种新颖的贪婪算法,即随机漫步概率高性价比懒惰前向(RWP-CELF)算法,该算法通过对高性价比懒惰前向(CELF)算法进行修改,使用时间比最先进算法少 25-50 个数量级。我们将 RWP-CELF 在真实数据集上的影响扩散效应与理论上证明的近似最优算法进行了比较。实验表明,RWP-CELF 的扩散效果与该算法相当,而运行时间则比该算法低得多。
{"title":"Influence maximization in mobile social networks based on RWP-CELF","authors":"","doi":"10.1007/s00607-024-01276-z","DOIUrl":"https://doi.org/10.1007/s00607-024-01276-z","url":null,"abstract":"<h3>Abstract</h3> <p>Influence maximization (IM) problem for messages propagation is an important topic in mobile social networks. The success of the spreading process depends on the mechanism for selection of the influential user. Beside selection of influential users, the computation and running time should be considered in this mechanism to ensure the accurecy and efficient. In this paper, considering that the overhead of exact computation varies nonlinearly with fluctuations in data size, random algorithm with smoother complexity change was designed to solve the IM problem in combination with greedy algorithm. Firstly, we proposed a method named two-hop neighbor network influence estimator to evaluate the influence of all nodes in the two-hop neighbor network. Then, we developed a novel greedy algorithm, the random walk probability cost-effective with lazy-forward (RWP-CELF) algorithm by modifying cost-effective with lazy-forward (CELF) with random algorithm, which uses 25–50 orders of magnitude less time than the state-of-the-art algorithms. We compared the influence spread effect of RWP-CELF on real datasets with a theoretically proven algorithm that is guaranteed to be approximately optimal. Experiments show that the spread effect of RWP-CELF is comparable to this algorithm, and the running time is much lower than this algorithm.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"19 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140199340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing information freshness in multi-class mobile edge computing systems using a hybrid discipline 利用混合学科提高多类移动边缘计算系统的信息新鲜度
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-19 DOI: 10.1007/s00607-024-01278-x
Tamer E. Fahim, Sherif I. Rabia, Ahmed H. Abd El-Malek, Waheed K. Zahra

Timely status updating in mobile edge computing (MEC) systems has recently gained the utmost interest in internet of things (IoT) networks, where status updates may need higher computations to be interpreted. Moreover, in real-life situations, the status update streams may also be of different priority classes according to their importance and timeliness constraints. The classical disciplines used for priority service differentiation, preemptive and non-preemptive disciplines, pose a dilemma of information freshness dissatisfaction for the whole priority network. This work proposes a hybrid preemptive/non-preemptive discipline under an M/M/1/2 priority queueing model to regulate the priority-based contention of the status update streams in MEC systems. For this hybrid discipline, a probabilistic discretionary rule for preemption is deployed to govern the server and buffer access independently, introducing distinct probability parameters to control the system performance. The stochastic hybrid system approach is utilized to analyze the average age of information (AoI) along with its higher moments for any number of classes. Then, a numerical study on a three-class network is conducted by evaluating the average AoI performance and the corresponding dispersion. The numerical observations underpin the significance of the hybrid-discipline parameters in ensuring the reliability of the whole priority network. Hence, four different approaches are introduced to demonstrate the setting of these parameters. Under these approaches, some outstanding features are manifested: exploiting the buffering resources efficiently, conserving the aggregate sensing power, and optimizing the whole network satisfaction. For this last feature, a near-optimal low-complex heuristic method is proposed.

移动边缘计算(MEC)系统中的及时状态更新最近在物联网(IoT)网络中获得了极大的关注,因为状态更新可能需要更高的计算量才能解读。此外,在现实生活中,状态更新流也可能根据其重要性和及时性限制而具有不同的优先级。用于区分优先级服务的经典规则--抢占式规则和非抢占式规则--给整个优先级网络带来了信息新鲜度不满意的困境。本研究提出了一种 M/M/1/2 优先级队列模型下的混合抢占/非抢占规则,用于调节 MEC 系统中基于优先级的状态更新流争用。对于这种混合纪律,采用了一种概率自由裁量抢占规则,以独立管理服务器和缓冲区的访问,并引入不同的概率参数来控制系统性能。利用随机混合系统方法分析了任意数量类别的平均信息年龄(AoI)及其高阶矩。然后,通过评估平均 AoI 性能和相应的离散性,对三类网络进行了数值研究。数值观测结果证明了混合学科参数在确保整个优先级网络可靠性方面的重要性。因此,介绍了四种不同的方法来演示这些参数的设置。在这些方法中,一些突出的特点得到了体现:有效利用缓冲资源、节约总感应功率以及优化整个网络的满意度。针对最后一个特点,提出了一种接近最优的低复杂度启发式方法。
{"title":"Enhancing information freshness in multi-class mobile edge computing systems using a hybrid discipline","authors":"Tamer E. Fahim, Sherif I. Rabia, Ahmed H. Abd El-Malek, Waheed K. Zahra","doi":"10.1007/s00607-024-01278-x","DOIUrl":"https://doi.org/10.1007/s00607-024-01278-x","url":null,"abstract":"<p>Timely status updating in mobile edge computing (MEC) systems has recently gained the utmost interest in internet of things (IoT) networks, where status updates may need higher computations to be interpreted. Moreover, in real-life situations, the status update streams may also be of different priority classes according to their importance and timeliness constraints. The classical disciplines used for priority service differentiation, preemptive and non-preemptive disciplines, pose a dilemma of information freshness dissatisfaction for the whole priority network. This work proposes a hybrid preemptive/non-preemptive discipline under an M/M/1/2 priority queueing model to regulate the priority-based contention of the status update streams in MEC systems. For this hybrid discipline, a probabilistic discretionary rule for preemption is deployed to govern the server and buffer access independently, introducing distinct probability parameters to control the system performance. The stochastic hybrid system approach is utilized to analyze the average age of information (AoI) along with its higher moments for any number of classes. Then, a numerical study on a three-class network is conducted by evaluating the average AoI performance and the corresponding dispersion. The numerical observations underpin the significance of the hybrid-discipline parameters in ensuring the reliability of the whole priority network. Hence, four different approaches are introduced to demonstrate the setting of these parameters. Under these approaches, some outstanding features are manifested: exploiting the buffering resources efficiently, conserving the aggregate sensing power, and optimizing the whole network satisfaction. For this last feature, a near-optimal low-complex heuristic method is proposed.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"7 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140168421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reducing the wrapping effect of set computation via Delaunay triangulation for guaranteed state estimation of nonlinear discrete-time systems 通过德劳内三角剖分减少集合计算的包裹效应,实现非线性离散时间系统的保证状态估计
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-15 DOI: 10.1007/s00607-024-01275-0
Jian Wan, Luc Jaulin

Set computation methods have been widely used to compute reachable sets, design invariant sets and estimate system state for dynamic systems. The wrapping effect of such set computation methods plays an essential role in the accuracy of their solutions. This paper studies the wrapping effect of existing interval, zonotopic and polytopic set computation methods and proposes novel approaches to reduce the wrapping effect for these set computation methods based on the task of computing the dynamic evolution of a nonlinear uncertain discrete-time system with a set as the initial state. The proposed novel approaches include the partition of a polytopic set via Delaunay triangulation and also the representation of a polytopic set by the union of small zonotopes for the following set propagation. The proposed novel approaches with the reduced wrapping effect has been further applied to state estimation of a nonlinear uncertain discrete-time system with improved accuracy. Similar to bisection for interval and zonotopic sets, Delaunay triangulation has been introduced as a set partition tool for polytopic sets, which has opened new research directions in terms of novel set partition, set representation and set propagation for reducing the wrapping effect of set computation.

集合计算方法已被广泛用于计算动态系统的可达集、设计不变集和估计系统状态。这类集合计算方法的包络效应对其求解的准确性起着至关重要的作用。本文以计算以集合为初始状态的非线性不确定离散时间系统的动态演化任务为基础,研究了现有区间集合、区位集合和多态集合计算方法的包裹效应,并提出了减少这些集合计算方法包裹效应的新方法。所提出的新方法包括通过 Delaunay 三角剖分法分割多顶集,以及用小的 zonotopes 的联合来表示多顶集,以进行后续的集合传播。所提出的减少包裹效应的新方法被进一步应用于非线性不确定离散时间系统的状态估计,并提高了精度。与区间集和众元集的二分法类似,Delaunay 三角剖分法也被引入作为多态集的集分割工具,它在新颖的集分割、集表示和集传播方面开辟了新的研究方向,以减少集计算的包裹效应。
{"title":"Reducing the wrapping effect of set computation via Delaunay triangulation for guaranteed state estimation of nonlinear discrete-time systems","authors":"Jian Wan, Luc Jaulin","doi":"10.1007/s00607-024-01275-0","DOIUrl":"https://doi.org/10.1007/s00607-024-01275-0","url":null,"abstract":"<p>Set computation methods have been widely used to compute reachable sets, design invariant sets and estimate system state for dynamic systems. The wrapping effect of such set computation methods plays an essential role in the accuracy of their solutions. This paper studies the wrapping effect of existing interval, zonotopic and polytopic set computation methods and proposes novel approaches to reduce the wrapping effect for these set computation methods based on the task of computing the dynamic evolution of a nonlinear uncertain discrete-time system with a set as the initial state. The proposed novel approaches include the partition of a polytopic set via Delaunay triangulation and also the representation of a polytopic set by the union of small zonotopes for the following set propagation. The proposed novel approaches with the reduced wrapping effect has been further applied to state estimation of a nonlinear uncertain discrete-time system with improved accuracy. Similar to bisection for interval and zonotopic sets, Delaunay triangulation has been introduced as a set partition tool for polytopic sets, which has opened new research directions in terms of novel set partition, set representation and set propagation for reducing the wrapping effect of set computation.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"43 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140150511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved indicator-based two-archive algorithm for many-objective optimization problems 多目标优化问题的改进型基于指标的双存档算法
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-15 DOI: 10.1007/s00607-024-01272-3
Weida Song, Shanxin Zhang, Wenlong Ge, Wei Wang

The large number of objectives in many-objective optimization problems (MaOPs) has posed significant challenges to the performance of multi-objective evolutionary algorithms (MOEAs) in terms of convergence and diversity. To design a more balanced MOEA, a multiple indicator-based two-archive algorithm named IBTA is proposed to deal with problems with complicated Pareto fronts. Specifically, a two-archive framework is introduced to focus on convergence and diversity separately. In IBTA, we assign different selection principles to the two archives. In the convergence archive, the inverted generational distance with noncontributing solution detection (IGD-NS) indicator is applied to choose the solutions with favorable convergence in each generation. In the diversity archive, we use crowdedness and fitness to select solutions with favorable diversity. To evaluate the performance of IBTA on MaOPs, we compare it with several state-of-the-art MOEAs on various benchmark problems with different Pareto fronts. The experimental results demonstrate that IBTA can deal with multi-objective optimization problems (MOPs)/MaOPs with satisfactory convergence and diversity.

多目标优化问题(MaOPs)中的大量目标对多目标进化算法(MOEAs)在收敛性和多样性方面的性能提出了巨大挑战。为了设计一种更加平衡的 MOEA,我们提出了一种名为 IBTA 的基于多指标的双拱算法,以处理具有复杂帕累托前沿的问题。具体来说,我们引入了一个双档案框架,分别关注收敛性和多样性。在 IBTA 中,我们为两个档案分配了不同的选择原则。在收敛性档案中,我们采用非贡献解检测(IGD-NS)的倒代距离指标来选择每一代中收敛性良好的解。在多样性档案中,我们使用拥挤度和适合度来选择具有良好多样性的解决方案。为了评估 IBTA 在 MaOPs 上的性能,我们在具有不同帕累托前沿的各种基准问题上将其与几种最先进的 MOEAs 进行了比较。实验结果表明,IBTA 能够以令人满意的收敛性和多样性处理多目标优化问题(MOPs)/MaOPs。
{"title":"An improved indicator-based two-archive algorithm for many-objective optimization problems","authors":"Weida Song, Shanxin Zhang, Wenlong Ge, Wei Wang","doi":"10.1007/s00607-024-01272-3","DOIUrl":"https://doi.org/10.1007/s00607-024-01272-3","url":null,"abstract":"<p>The large number of objectives in many-objective optimization problems (MaOPs) has posed significant challenges to the performance of multi-objective evolutionary algorithms (MOEAs) in terms of convergence and diversity. To design a more balanced MOEA, a multiple indicator-based two-archive algorithm named IBTA is proposed to deal with problems with complicated Pareto fronts. Specifically, a two-archive framework is introduced to focus on convergence and diversity separately. In IBTA, we assign different selection principles to the two archives. In the convergence archive, the inverted generational distance with noncontributing solution detection (IGD-NS) indicator is applied to choose the solutions with favorable convergence in each generation. In the diversity archive, we use crowdedness and fitness to select solutions with favorable diversity. To evaluate the performance of IBTA on MaOPs, we compare it with several state-of-the-art MOEAs on various benchmark problems with different Pareto fronts. The experimental results demonstrate that IBTA can deal with multi-objective optimization problems (MOPs)/MaOPs with satisfactory convergence and diversity.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"98 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140150301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Employing topology modification strategies in scale-free IoT networks for robustness optimization 在无标度物联网网络中采用拓扑修改策略优化鲁棒性
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-12 DOI: 10.1007/s00607-024-01273-2
Zahoor Ali Khan, Muhammad Awais, Turki Ali Alghamdi, Nadeem Javaid

Nowadays, the Internet of Things (IoT) networks provide benefits to humans in numerous domains by empowering the projects of smart cities, healthcare, industrial enhancement and so forth. The IoT networks include nodes, which deliver the data to the destination. However, the network nodes’ connectivity is affected by the nodes’ removal caused due to the malicious attacks. The ideal plan is to construct a topology that maintains nodes’ connectivity after the attacks and subsequently increases the network robustness. Therefore, for constructing a robust scale-free network, two different mechanisms are adopted in this paper. First, a Multi-Population Genetic Algorithm (MPGA) is used to deal with premature convergence in GA. Then, an entropy based mechanism is used, which replaces the worst solution of high entropy population with the best solution of low entropy population to improve the network robustness. Second, two types of Edge Swap Mechanisms (ESMs) are proposed. The Efficiency based Edge Swap Mechanism (EESM) selects the pair of edges with high efficiency. While the second ESM named as EESM-Assortativity, transforms the network topology into an onion-like structure to achieve maximum connectivity between similar degree network nodes. Further, Hill Climbing (HC) and Simulated Annealing (SA) methods are used for optimizing the network robustness. The simulation results show that the proposed MPGA Entropy has 9% better network robustness as compared to MPGA. Moreover, both the proposed ESMs effectively increase the network robustness with an average of 15% better robustness as compared to HC and SA. Furthermore, they increase the graph density as well as network’s connectivity.

如今,物联网(IoT)网络通过支持智能城市、医疗保健、工业提升等项目,在众多领域为人类造福。物联网网络包括将数据传送到目的地的节点。然而,恶意攻击导致的节点移除会影响网络节点的连接性。理想的方案是构建一种拓扑结构,在受到攻击后保持节点的连通性,从而提高网络的鲁棒性。因此,为了构建鲁棒的无标度网络,本文采用了两种不同的机制。首先,采用多群体遗传算法(MPGA)来处理 GA 过早收敛的问题。然后,采用基于熵的机制,用低熵种群的最优解替换高熵种群的最差解,以提高网络的鲁棒性。其次,提出了两种边缘交换机制(ESM)。基于效率的边缘交换机制(ESM)选择效率高的边缘对。第二种机制被称为 EESM-排列组合机制,它将网络拓扑结构转化为洋葱状结构,以实现相似度网络节点之间的最大连通性。此外,还采用了爬山法(HC)和模拟退火法(SA)来优化网络的鲁棒性。仿真结果表明,与 MPGA 相比,拟议的 MPGA Entropy 的网络鲁棒性提高了 9%。此外,与 HC 和 SA 相比,提出的两种 ESM 都能有效提高网络鲁棒性,平均提高 15%。此外,它们还提高了图密度和网络的连通性。
{"title":"Employing topology modification strategies in scale-free IoT networks for robustness optimization","authors":"Zahoor Ali Khan, Muhammad Awais, Turki Ali Alghamdi, Nadeem Javaid","doi":"10.1007/s00607-024-01273-2","DOIUrl":"https://doi.org/10.1007/s00607-024-01273-2","url":null,"abstract":"<p>Nowadays, the Internet of Things (IoT) networks provide benefits to humans in numerous domains by empowering the projects of smart cities, healthcare, industrial enhancement and so forth. The IoT networks include nodes, which deliver the data to the destination. However, the network nodes’ connectivity is affected by the nodes’ removal caused due to the malicious attacks. The ideal plan is to construct a topology that maintains nodes’ connectivity after the attacks and subsequently increases the network robustness. Therefore, for constructing a robust scale-free network, two different mechanisms are adopted in this paper. First, a Multi-Population Genetic Algorithm (MPGA) is used to deal with premature convergence in GA. Then, an entropy based mechanism is used, which replaces the worst solution of high entropy population with the best solution of low entropy population to improve the network robustness. Second, two types of Edge Swap Mechanisms (ESMs) are proposed. The Efficiency based Edge Swap Mechanism (EESM) selects the pair of edges with high efficiency. While the second ESM named as EESM-Assortativity, transforms the network topology into an onion-like structure to achieve maximum connectivity between similar degree network nodes. Further, Hill Climbing (HC) and Simulated Annealing (SA) methods are used for optimizing the network robustness. The simulation results show that the proposed MPGA Entropy has 9% better network robustness as compared to MPGA. Moreover, both the proposed ESMs effectively increase the network robustness with an average of 15% better robustness as compared to HC and SA. Furthermore, they increase the graph density as well as network’s connectivity.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"15 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140126563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1