首页 > 最新文献

IEEE Transactions on Sustainable Computing最新文献

英文 中文
Tensor Factorization for Accurate Anomaly Detection in Dynamic Networks 张量分解在动态网络中的精确异常检测
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-18 DOI: 10.1109/TSUSC.2024.3462814
Xiaocan Li;Jigang Wen;Kun Xie;Gaogang Xie;Wei Liang
Accurately detecting traffic anomalies becomes increasingly crucial in network management. Algorithms that model the traffic data as a matrix suffers from low detection accuracy, while the work using the tensor model often assumes the tensor is regular without considering that network nodes may dynamically join in or leave, which will fail in a practical network with the change of node set as a result of mobility and churn behaviors. We propose a novel Tensor Recovery scheme in a Dynamic Network (TRDN) with traffic data modeled as a practical irregular tensor for accurate anomaly detection. To take advantage of correlations among small tensors, each formed with a short time duration to capture more hidden information in the data for higher detection accuracy, we propose several novel techniques: 1) a new joint tensor factorization model to capture the characteristic shared by the common nodes of small tensors, 2) a tensor partition algorithm to identify the data that can be applied to train the shared parameters efficiently, and 3) a bar-based algorithm that partitions nodes into the minimum number of no-overlapping subsets to form the shared tensor model. Extensive experiments on two Internet traffic data sets, Abilene and GÈANT, demonstrate the effectiveness of the proposed TRDN.
准确检测流量异常在网络管理中变得越来越重要。将交通数据建模为矩阵的算法检测精度较低,而使用张量模型的工作通常假设张量是规则的,而没有考虑网络节点可能动态加入或离开,这在实际网络中由于节点集的移动和流失行为的变化而失败。我们提出了一种新的动态网络(TRDN)中的张量恢复方案,将交通数据建模为一个实用的不规则张量,用于准确的异常检测。为了利用小张量之间的相关性,每个张量都在短时间内形成,以捕获数据中更多隐藏的信息,从而提高检测精度,我们提出了几种新技术:1)一种新的联合张量分解模型,用于捕获小张量公共节点共享的特征;2)一种张量划分算法,用于识别可用于有效训练共享参数的数据;3)一种基于条的算法,将节点划分为最小数量的无重叠子集,形成共享张量模型。在Abilene和GÈANT两个互联网流量数据集上进行的大量实验证明了所提出的TRDN的有效性。
{"title":"Tensor Factorization for Accurate Anomaly Detection in Dynamic Networks","authors":"Xiaocan Li;Jigang Wen;Kun Xie;Gaogang Xie;Wei Liang","doi":"10.1109/TSUSC.2024.3462814","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3462814","url":null,"abstract":"Accurately detecting traffic anomalies becomes increasingly crucial in network management. Algorithms that model the traffic data as a matrix suffers from low detection accuracy, while the work using the tensor model often assumes the tensor is regular without considering that network nodes may dynamically join in or leave, which will fail in a practical network with the change of node set as a result of mobility and churn behaviors. We propose a novel Tensor Recovery scheme in a Dynamic Network (TRDN) with traffic data modeled as a practical irregular tensor for accurate anomaly detection. To take advantage of correlations among small tensors, each formed with a short time duration to capture more hidden information in the data for higher detection accuracy, we propose several novel techniques: 1) a new joint tensor factorization model to capture the characteristic shared by the common nodes of small tensors, 2) a tensor partition algorithm to identify the data that can be applied to train the shared parameters efficiently, and 3) a bar-based algorithm that partitions nodes into the minimum number of no-overlapping subsets to form the shared tensor model. Extensive experiments on two Internet traffic data sets, Abilene and GÈANT, demonstrate the effectiveness of the proposed TRDN.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"439-450"},"PeriodicalIF":3.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Let Robots Watch Grass Grow: Optimal Task Assignment for Automatic Plant Factory 让机器人看草:自动化工厂的最佳任务分配
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-17 DOI: 10.1109/TSUSC.2024.3462447
Zhengzhe Xiang;Xizi Xue;Yuanyi Chen;Schahram Dustdar;Minyi Guo
Modularized plant factories, characterized by machines executing intelligent control requests to automatically take care of crops, have emerged as a sustainable agricultural paradigm, garnering the attention of Internet-of-Things and agricultural researchers for their production stability and energy efficiency. However, the diversity and pluralism of the plant factory components make it difficult to cooperate and produce crops with better qualities. Therefore, appropriate resource allocation and task scheduling strategies become the key points to optimize the quality of production in the factories by immediately telling which component is more suitable to do what in taking care of the crops. To address this challenge, this paper investigates how the machines of the factory can use their unique services and resource to help improve the crops’ quality and model the machine cooperation as an online decision-making problem. An $alpha$-competitive approach called $textsc {OnATS}$ is designed based on the transformation of the original problem, and the experiments show that the proposed algorithm is superior to the baselines. Additionally, this paper explores the impact of different system configurations on the proposed method and shows that the proposed approach has broad applicability.
模块化植物工厂的特点是,机器执行智能控制请求,自动照顾作物,这是一种可持续农业模式,因其生产稳定性和能源效率而受到物联网和农业研究人员的关注。然而,植物工厂组成部分的多样性和多元性使得合作和生产品质更好的作物变得困难。因此,适当的资源分配和任务调度策略成为优化工厂生产质量的关键,通过即时告诉哪些组件更适合做什么来照顾作物。为了解决这一挑战,本文研究了工厂的机器如何利用其独特的服务和资源来帮助提高作物质量,并将机器合作建模为在线决策问题。在对原始问题进行变换的基础上,设计了一种$alpha$竞争算法$textsc {OnATS}$,实验表明该算法优于基线算法。此外,本文还探讨了不同系统配置对所提方法的影响,并表明所提方法具有广泛的适用性。
{"title":"Let Robots Watch Grass Grow: Optimal Task Assignment for Automatic Plant Factory","authors":"Zhengzhe Xiang;Xizi Xue;Yuanyi Chen;Schahram Dustdar;Minyi Guo","doi":"10.1109/TSUSC.2024.3462447","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3462447","url":null,"abstract":"Modularized plant factories, characterized by machines executing intelligent control requests to automatically take care of crops, have emerged as a sustainable agricultural paradigm, garnering the attention of Internet-of-Things and agricultural researchers for their production stability and energy efficiency. However, the diversity and pluralism of the plant factory components make it difficult to cooperate and produce crops with better qualities. Therefore, appropriate resource allocation and task scheduling strategies become the key points to optimize the quality of production in the factories by immediately telling which component is more suitable to do what in taking care of the crops. To address this challenge, this paper investigates how the machines of the factory can use their unique services and resource to help improve the crops’ quality and model the machine cooperation as an online decision-making problem. An <inline-formula><tex-math>$alpha$</tex-math></inline-formula>-competitive approach called <inline-formula><tex-math>$textsc {OnATS}$</tex-math></inline-formula> is designed based on the transformation of the original problem, and the experiments show that the proposed algorithm is superior to the baselines. Additionally, this paper explores the impact of different system configurations on the proposed method and shows that the proposed approach has broad applicability.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"464-474"},"PeriodicalIF":3.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Policy Dynamic Programming Based Intelligent Data Routing Scheme for IoT-Enabled Wireless Sensor Networks 基于深度策略动态规划的物联网无线传感器网络智能数据路由方案
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-17 DOI: 10.1109/TSUSC.2024.3462512
Archana Ojha;Sahil Manikchand Chaudhari;Prasenjit Chanak
Nowadays, the Internet of Things (IoT) plays a significant role in the development of various real-life applications such as smart cities, healthcare, precision agriculture, and industrial automation. Wireless Sensor Networks (WSNs) are a major ingredient of these IoT-based applications. In WSNs, sensor nodes that are close to the Base Station (BS) relay more data packets compared to other nodes, which creates high energy consumption at nodes close to the BS. As a result, an energy imbalance is created among the sensor nodes. Therefore, sensor nodes close to BS die early as compared to the faraway sensor nodes. These early dead nodes drastically increase data collection delay within the network. Furthermore, the early death of the sensor nodes partitions the network into different isolated sub-networks/segments. The formation of isolated segments causes premature death of the network. This paper proposes a Deep Policy Dynamic Programming (DPDP) based intelligent data routing scheme for IoT-enabled WSNs. The proposed scheme identifies an optimal number of Cluster Heads (CHs) and forms clusters to reduce the energy consumption of the deployed sensor nodes and prevent the early death of sensor nodes. Furthermore, the proposed scheme identifies an optimal number of Rendezvous Points (RPs) and designs an optimal path for Mobile Sink (MS) based data collection. Optimal RP selection and path design algorithms prevent the premature death of the network and significantly improve the overall performance of the network. Extensive simulations and test-bed experiments are conducted to test the performance of the proposed scheme. The simulation and test-bed results show that the proposed scheme outperforms as compared to the existing state-of-the-art approaches in terms of network lifetime, network stability, data loss due to buffer overflow, residual energy, and delay.
如今,物联网(IoT)在智能城市、医疗保健、精准农业和工业自动化等各种现实应用的发展中发挥着重要作用。无线传感器网络(wsn)是这些基于物联网的应用的主要组成部分。在wsn中,靠近基站的传感器节点比其他节点中继更多的数据包,这导致靠近基站的节点能耗高。因此,在传感器节点之间产生能量不平衡。因此,离BS较近的传感器节点死亡时间较远。这些早死节点极大地增加了网络中的数据收集延迟。此外,传感器节点的早期死亡将网络划分为不同的隔离子网络/段。孤立网段的形成导致网络过早死亡。提出了一种基于深度策略动态规划(DPDP)的物联网无线传感器网络智能数据路由方案。该方案确定最优簇头数量并形成簇,以减少部署的传感器节点的能量消耗,防止传感器节点过早死亡。此外,该方案确定了最优数量的交会点(RPs),并设计了基于移动汇(MS)的数据采集的最优路径。最优RP选择和路径设计算法防止了网络的过早死亡,显著提高了网络的整体性能。通过大量的仿真和试验台实验来验证所提方案的性能。仿真和测试结果表明,与现有的最先进的方法相比,所提出的方案在网络寿命、网络稳定性、缓冲区溢出导致的数据丢失、剩余能量和延迟方面都优于现有的方法。
{"title":"A Deep Policy Dynamic Programming Based Intelligent Data Routing Scheme for IoT-Enabled Wireless Sensor Networks","authors":"Archana Ojha;Sahil Manikchand Chaudhari;Prasenjit Chanak","doi":"10.1109/TSUSC.2024.3462512","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3462512","url":null,"abstract":"Nowadays, the Internet of Things (IoT) plays a significant role in the development of various real-life applications such as smart cities, healthcare, precision agriculture, and industrial automation. Wireless Sensor Networks (WSNs) are a major ingredient of these IoT-based applications. In WSNs, sensor nodes that are close to the Base Station (BS) relay more data packets compared to other nodes, which creates high energy consumption at nodes close to the BS. As a result, an energy imbalance is created among the sensor nodes. Therefore, sensor nodes close to BS die early as compared to the faraway sensor nodes. These early dead nodes drastically increase data collection delay within the network. Furthermore, the early death of the sensor nodes partitions the network into different isolated sub-networks/segments. The formation of isolated segments causes premature death of the network. This paper proposes a Deep Policy Dynamic Programming (DPDP) based intelligent data routing scheme for IoT-enabled WSNs. The proposed scheme identifies an optimal number of Cluster Heads (CHs) and forms clusters to reduce the energy consumption of the deployed sensor nodes and prevent the early death of sensor nodes. Furthermore, the proposed scheme identifies an optimal number of Rendezvous Points (RPs) and designs an optimal path for Mobile Sink (MS) based data collection. Optimal RP selection and path design algorithms prevent the premature death of the network and significantly improve the overall performance of the network. Extensive simulations and test-bed experiments are conducted to test the performance of the proposed scheme. The simulation and test-bed results show that the proposed scheme outperforms as compared to the existing state-of-the-art approaches in terms of network lifetime, network stability, data loss due to buffer overflow, residual energy, and delay.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"451-463"},"PeriodicalIF":3.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Workload Pattern Learning-Based Cloud Resource Management Models: Concepts and Meta-Analysis 基于工作量模式学习的云资源管理模型:概念和元分析
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-09 DOI: 10.1109/TSUSC.2024.3456429
Deepika Saxena;Ashutosh Kumar Singh
Workload pattern learning-based resource management is crucial for cloud computing environments for achieving higher performance, sustainability, fault-tolerance, and quality of service. The existing literature lacks a comprehensive discussion and meta-analysis of workload pattern learning centered cloud resource management. In this context, this paper presents a first comprehensive study about five pattern learning and analysis-driven techniques applied for achieving higher efficiency and performance during multi-constrained cloud resource management. The paper manifests utility and significance of workload pattern learning-based resource management as compared with traditional resource management. The five principle techniques are thoroughly discussed with coherent depiction of intended concept alongwith numerical illustration. The most prominent state-of-the-art models belonging to each technique are further distinguished based on distinct objectives conferring an extensive survey and comparison. Besides, conceptual and theoretical analysis, the leading models underlying the major resource management techniques are implemented on a common platform and thoroughly examined using real-world Google Cluster workload traces. Based on the all-inclusive study and performance evaluation, trade-off discussion among these techniques are capsuled to put forward imperative concluding remarks with concrete open issues and insightful future research directions.
基于工作负载模式学习的资源管理对于云计算环境实现更高的性能、可持续性、容错性和服务质量至关重要。现有文献缺乏以工作负载模式学习为中心的云资源管理的全面讨论和元分析。在此背景下,本文首次全面研究了五种模式学习和分析驱动技术,这些技术用于在多约束云资源管理期间实现更高的效率和性能。通过与传统资源管理的比较,体现了基于工作量模式学习的资源管理的实用性和意义。五个原则技术进行了深入的讨论与连贯的描述意图的概念以及数值说明。属于每种技术的最突出的最先进的模型将根据不同的目标进一步区分,并进行广泛的调查和比较。除了概念和理论分析之外,主要资源管理技术背后的主要模型是在一个公共平台上实现的,并使用真实的谷歌集群工作负载跟踪进行了彻底的检查。在全面研究和绩效评价的基础上,对这些技术进行权衡讨论,提出势在必行的结束语,提出具体的开放性问题和有见地的未来研究方向。
{"title":"Workload Pattern Learning-Based Cloud Resource Management Models: Concepts and Meta-Analysis","authors":"Deepika Saxena;Ashutosh Kumar Singh","doi":"10.1109/TSUSC.2024.3456429","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3456429","url":null,"abstract":"Workload pattern learning-based resource management is crucial for cloud computing environments for achieving higher performance, sustainability, fault-tolerance, and quality of service. The existing literature lacks a comprehensive discussion and meta-analysis of workload pattern learning centered cloud resource management. In this context, this paper presents a first comprehensive study about five pattern learning and analysis-driven techniques applied for achieving higher efficiency and performance during multi-constrained cloud resource management. The paper manifests utility and significance of workload pattern learning-based resource management as compared with traditional resource management. The five principle techniques are thoroughly discussed with coherent depiction of intended concept alongwith numerical illustration. The most prominent state-of-the-art models belonging to each technique are further distinguished based on distinct objectives conferring an extensive survey and comparison. Besides, conceptual and theoretical analysis, the leading models underlying the major resource management techniques are implemented on a common platform and thoroughly examined using real-world Google Cluster workload traces. Based on the all-inclusive study and performance evaluation, trade-off discussion among these techniques are capsuled to put forward imperative concluding remarks with concrete open issues and insightful future research directions.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 3","pages":"418-438"},"PeriodicalIF":3.0,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144219810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conditional Data-Sharing Privacy-Preserving Scheme in Blockchain-Based Social Internet of Vehicles 基于区块链的社交车联网条件数据共享隐私保护方案
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-30 DOI: 10.1109/TSUSC.2024.3452228
Zhuoqun Xia;Jiahuan Man;Ke Gu;Xiong Li;Longfei Huang
Social Internet of Vehicles (SIoVs) is an important information exchange platform to provide comprehensive traffic services by sharing vehicle-aware data. However, traditional data sharing methods can not provide the security of decentralized data sharing, making it possible for some malicious third parties to initiate dishonest behaviors. Additionally, the lack of access control for data sharing in SIoVs easily leads to unauthorized data sharing, thus user privacy is threatened and the source of false data is difficult to be traced. In this paper, we propose a conditional data-sharing privacy-preserving scheme for blockchain-based social internet of vehicles. In our scheme, a lightweight ledger-based blockchain system is designed, which combines with the ciphertext-policy attribute-based encryption method to realize anonymous one-to-many sharing of data with fine-grained access management. Also, a collaborative identity tracing method is constructed to trace malicious users who provide false data. Our scheme can effectively prevent second-hand data sharing and safeguard user privacy. Moreover, related experimental results validate the efficiency of our scheme.
社交车联网(SIoVs)是通过共享车辆感知数据提供综合交通服务的重要信息交换平台。然而,传统的数据共享方式无法提供分散的数据共享的安全性,使得一些恶意的第三方有可能发起不诚实的行为。此外,siv中缺乏对数据共享的访问控制,容易导致未经授权的数据共享,从而威胁用户隐私,难以追踪虚假数据的来源。在本文中,我们提出了一种基于区块链的社交车联网的条件数据共享隐私保护方案。在我们的方案中,设计了一个轻量级的基于账本的区块链系统,结合基于密文-策略属性的加密方法,通过细粒度的访问管理,实现了数据的匿名一对多共享。此外,还构建了一种协同身份跟踪方法,用于跟踪提供虚假数据的恶意用户。我们的方案可以有效防止二手数据共享,保护用户隐私。相关实验结果验证了该方案的有效性。
{"title":"Conditional Data-Sharing Privacy-Preserving Scheme in Blockchain-Based Social Internet of Vehicles","authors":"Zhuoqun Xia;Jiahuan Man;Ke Gu;Xiong Li;Longfei Huang","doi":"10.1109/TSUSC.2024.3452228","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3452228","url":null,"abstract":"Social Internet of Vehicles (SIoVs) is an important information exchange platform to provide comprehensive traffic services by sharing vehicle-aware data. However, traditional data sharing methods can not provide the security of decentralized data sharing, making it possible for some malicious third parties to initiate dishonest behaviors. Additionally, the lack of access control for data sharing in SIoVs easily leads to unauthorized data sharing, thus user privacy is threatened and the source of false data is difficult to be traced. In this paper, we propose a conditional data-sharing privacy-preserving scheme for blockchain-based social internet of vehicles. In our scheme, a lightweight ledger-based blockchain system is designed, which combines with the ciphertext-policy attribute-based encryption method to realize anonymous one-to-many sharing of data with fine-grained access management. Also, a collaborative identity tracing method is constructed to trace malicious users who provide false data. Our scheme can effectively prevent second-hand data sharing and safeguard user privacy. Moreover, related experimental results validate the efficiency of our scheme.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 2","pages":"378-395"},"PeriodicalIF":3.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143769400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Modular Co-Simulation Platform for Comparing Flexibility Solutions in District Heating Under Variable Operating Conditions 不同工况下区域供热柔性方案比较的模块化联合仿真平台
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-26 DOI: 10.1109/TSUSC.2024.3449977
Pietro Rando Mazzarino;Martina Capone;Elisa Guelpa;Lorenzo Bottaccioli;Vittorio Verda;Edoardo Patti
Integrated modeling and simulation are crucial for optimizing cities’ energy planning. Existing sector-specific analyses have implementation limitations in representing interactions across infrastructures, limiting optimization potentials. An integrated framework simulating multiple interacting components from a systemic perspective could reveal efficiency gains, flexibility, and synergies across urban energy networks to guide sustainable energy transitions. Co-simulation approaches are gaining attention for analyzing complex interconnected systems like District Heating (DH). Traditional single-discipline models present limitations in fully representing the interconnectivity between district heating networks and related subsystems, such as those in buildings and energy generation. Therefore, we propose a co-simulation based framework to simulate DH system behavior while easily integrating models of other subsystems and Functional Mock-up Unit (FMU) simulators. We tested this Plug&Play modular framework for Demand Side Management (DSM) and Storage-based strategies, evaluating their effectiveness in peak reduction while lowering the temperatures of the network.
综合建模与仿真是优化城市能源规划的关键。现有的特定行业分析在表示跨基础设施的交互方面存在实现限制,限制了优化潜力。从系统角度模拟多个相互作用组件的集成框架可以揭示城市能源网络的效率提高、灵活性和协同效应,从而指导可持续能源转型。联合仿真方法在区域供热系统等复杂互联系统的分析中受到越来越多的关注。传统的单一学科模型在充分表示区域供热网络和相关子系统(如建筑和能源生产中的子系统)之间的互联性方面存在局限性。因此,我们提出了一个基于联合仿真的框架来模拟DH系统的行为,同时很容易地集成其他子系统和功能模拟单元(FMU)模拟器的模型。我们针对需求侧管理(DSM)和基于存储的策略测试了这种即插即用模块化框架,评估了它们在降低网络温度的同时减少峰值的有效性。
{"title":"A Modular Co-Simulation Platform for Comparing Flexibility Solutions in District Heating Under Variable Operating Conditions","authors":"Pietro Rando Mazzarino;Martina Capone;Elisa Guelpa;Lorenzo Bottaccioli;Vittorio Verda;Edoardo Patti","doi":"10.1109/TSUSC.2024.3449977","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3449977","url":null,"abstract":"Integrated modeling and simulation are crucial for optimizing cities’ energy planning. Existing sector-specific analyses have implementation limitations in representing interactions across infrastructures, limiting optimization potentials. An integrated framework simulating multiple interacting components from a systemic perspective could reveal efficiency gains, flexibility, and synergies across urban energy networks to guide sustainable energy transitions. Co-simulation approaches are gaining attention for analyzing complex interconnected systems like District Heating (DH). Traditional single-discipline models present limitations in fully representing the interconnectivity between district heating networks and related subsystems, such as those in buildings and energy generation. Therefore, we propose a co-simulation based framework to simulate DH system behavior while easily integrating models of other subsystems and Functional Mock-up Unit (FMU) simulators. We tested this Plug&Play modular framework for Demand Side Management (DSM) and Storage-based strategies, evaluating their effectiveness in peak reduction while lowering the temperatures of the network.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 2","pages":"408-417"},"PeriodicalIF":3.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10648783","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143769401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic State Estimation for Multi-Machine Power Grids Under Randomly Occurring Cyber-Attacks: A Decentralized Framework 随机网络攻击下多机电网的动态估计:一个去中心化框架
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-22 DOI: 10.1109/TSUSC.2024.3448225
Bogang Qu;Zidong Wang;Bo Shen;Daogang Peng;Dong Yue
Dynamic state estimation (DSE) plays a vitally important role in modern power systems, and the reliance on the communication network often render the systems to cyber-threats. This paper investigates the secure DSE problem for the multi-generator power grids in the presence of randomly occurring cyber-attacks. To facilitate the decentralized DSE, the synchronous generator is decoupled form the large-scale interconnected power grid with the aid of model decoupling method. A hybrid cyber-attack model, which includes three typical and representative attacks (i.e., denial-of-service attacks, bias injection attacks and replay attacks), is designed and launched in a random way. Attention is devoted to the secure algorithm design problem to light the negative impacts on the DSE performance from the nonlinearity/non-Gaussianity and the random occurrences of the cyber-attacks. Specifically, i) a likelihood function modification method is established where the knowledge of the hybrid-attack model is fully considered; and ii) the associated weights of the particles are updated according to the proposed likelihood function to resist the impacts caused by the randomly occurring cyber-attacks. Finally, simulation experiments with four scenarios are implemented on the IEEE 39-bus system and the corresponding analyses show the validity of the decentralized secure DSE scheme.
动态状态估计在现代电力系统中起着至关重要的作用,而对通信网络的依赖往往使系统面临网络威胁。本文研究了随机网络攻击情况下多发电机组电网的安全DSE问题。采用模型解耦的方法,将同步发电机从大型互联电网中解耦出来,以实现分散的离散动力分析。设计并随机启动了一种混合网络攻击模型,该模型包括拒绝服务攻击、偏见注入攻击和重放攻击三种典型和代表性的攻击方式。重点研究安全算法设计问题,以减轻网络攻击的非线性/非高斯性和随机发生对DSE性能的负面影响。具体而言,i)建立了充分考虑混合攻击模型知识的似然函数修正方法;ii)根据提出的似然函数更新粒子的关联权值,以抵抗随机发生的网络攻击所带来的影响。最后,在IEEE 39总线系统上进行了四种场景的仿真实验,并进行了相应的分析,验证了分散安全DSE方案的有效性。
{"title":"Dynamic State Estimation for Multi-Machine Power Grids Under Randomly Occurring Cyber-Attacks: A Decentralized Framework","authors":"Bogang Qu;Zidong Wang;Bo Shen;Daogang Peng;Dong Yue","doi":"10.1109/TSUSC.2024.3448225","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3448225","url":null,"abstract":"Dynamic state estimation (DSE) plays a vitally important role in modern power systems, and the reliance on the communication network often render the systems to cyber-threats. This paper investigates the secure DSE problem for the multi-generator power grids in the presence of randomly occurring cyber-attacks. To facilitate the decentralized DSE, the synchronous generator is decoupled form the large-scale interconnected power grid with the aid of model decoupling method. A hybrid cyber-attack model, which includes three typical and representative attacks (i.e., denial-of-service attacks, bias injection attacks and replay attacks), is designed and launched in a random way. Attention is devoted to the secure algorithm design problem to light the negative impacts on the DSE performance from the nonlinearity/non-Gaussianity and the random occurrences of the cyber-attacks. Specifically, i) a likelihood function modification method is established where the knowledge of the hybrid-attack model is fully considered; and ii) the associated weights of the particles are updated according to the proposed likelihood function to resist the impacts caused by the randomly occurring cyber-attacks. Finally, simulation experiments with four scenarios are implemented on the IEEE 39-bus system and the corresponding analyses show the validity of the decentralized secure DSE scheme.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 2","pages":"396-407"},"PeriodicalIF":3.0,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143769495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved AFSA-Based Energy-Aware Content Caching Strategy for UAV-Assisted VEC 改进的基于afsa的无人机辅助VEC能量感知内容缓存策略
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-16 DOI: 10.1109/TSUSC.2024.3444949
Kejun Long;Chunlin Li;Kun Jiang;Shaohua Wan
UAV-assisted VEC can provide content caching services for vehicles by flying close to the vehicles for vehicle's QoS. However, in real-world scenarios with traffic congestion, due to the battery capacity and cache space limitations of UAVs, low content response speed and high response latency may occur. Based on this, we proposed a dynamic energy consumption-based content caching strategy in UAV-assisted VEC. We use the PSO algorithm to solve the problem and obtain the optimal UAV deployment location. For content caching, we construct a content caching model by considering UAV deployment, vehicle user preference, UAV cache capacity, and UAV energy consumption with the goal of minimizing content request latency. In addition, we propose an IAFSA-based content caching strategy. We reduce the solution space of the fish swarm algorithm, decrease the number of caching decisions, and improve the convergence performance of AFSA by employing dynamic horizons and step sizes. Experimental results show that the proposed IAFSA effectively reduces the average content request latency of the vehicle, improves the cache hit rate, and reduces the number of content return trips. Particularly, the proposed strategy reduces the average content request latency by more than 9.84% compared to the baseline algorithm.
无人机辅助VEC可以通过近距离飞行为车辆提供内容缓存服务,以保证车辆的QoS。然而,在交通拥堵的现实场景中,由于无人机的电池容量和缓存空间的限制,可能会出现内容响应速度低、响应延迟高的情况。在此基础上,提出了一种基于无人机辅助VEC的动态能量消耗的内容缓存策略。利用粒子群算法求解该问题,得到无人机的最优部署位置。在内容缓存方面,以最小化内容请求延迟为目标,综合考虑无人机部署、车辆用户偏好、无人机缓存容量和无人机能耗等因素,构建了内容缓存模型。此外,我们提出了一种基于iafsa的内容缓存策略。通过采用动态视界和步长,减小了鱼群算法的解空间,减少了缓存决策的数量,提高了AFSA的收敛性能。实验结果表明,提出的IAFSA有效地降低了车辆的平均内容请求延迟,提高了缓存命中率,减少了内容返回次数。特别是,与基线算法相比,该策略将平均内容请求延迟降低了9.84%以上。
{"title":"Improved AFSA-Based Energy-Aware Content Caching Strategy for UAV-Assisted VEC","authors":"Kejun Long;Chunlin Li;Kun Jiang;Shaohua Wan","doi":"10.1109/TSUSC.2024.3444949","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3444949","url":null,"abstract":"UAV-assisted VEC can provide content caching services for vehicles by flying close to the vehicles for vehicle's QoS. However, in real-world scenarios with traffic congestion, due to the battery capacity and cache space limitations of UAVs, low content response speed and high response latency may occur. Based on this, we proposed a dynamic energy consumption-based content caching strategy in UAV-assisted VEC. We use the PSO algorithm to solve the problem and obtain the optimal UAV deployment location. For content caching, we construct a content caching model by considering UAV deployment, vehicle user preference, UAV cache capacity, and UAV energy consumption with the goal of minimizing content request latency. In addition, we propose an IAFSA-based content caching strategy. We reduce the solution space of the fish swarm algorithm, decrease the number of caching decisions, and improve the convergence performance of AFSA by employing dynamic horizons and step sizes. Experimental results show that the proposed IAFSA effectively reduces the average content request latency of the vehicle, improves the cache hit rate, and reduces the number of content return trips. Particularly, the proposed strategy reduces the average content request latency by more than 9.84% compared to the baseline algorithm.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 2","pages":"366-377"},"PeriodicalIF":3.0,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143769497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stochastic Computation Model for Solar Panel Size and Cost of Sustainable IoT Networks 可持续物联网网络太阳能电池板尺寸和成本的随机计算模型
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-14 DOI: 10.1109/TSUSC.2024.3443450
Atul Banotra;Deepak Mishra;Sudhakar Modem
The Internet of Things (IoT) applications require uninterrupted network operation which is often hindered by battery energy constraints. Literature suggests that solar energy harvesting is a promising approach to powering IoT devices in a sustainable manner. However, the available literature overlooks key factors of determining effective solar panel size and cost while considering the IoT consumption for sustainable operation. This article tackles these pivotal aspects by investigating viability of commercially available solar panels as a sustainable energy source for IoT applications. A novel stochastic computation model is introduced to characterize the unpredictability of solar irradiance across three different time regions of the day. By employing distribution fitting models, the proposed computation model accurately determines the required solar panel size in cm$^{2}$ and panel cost in Indian Rupees for the sustainable operation of the IoT application. Further, the proposed model incorporates the assessment of outage and sustainability probabilities for user-specified solar panel size and cost. These insights are significant in settings where energy efficiency and sustainability are crucial. Numerical results are presented to validate the derived distribution models and performance metrics for sustainable IoT applications. The effectiveness and accuracy of the proposed model are validated by comparing results with baseline model.
物联网(IoT)应用需要不间断的网络运行,而这通常受到电池能量限制的阻碍。文献表明,太阳能收集以可持续的方式为物联网设备供电是一种很有前途的方法。然而,现有文献忽略了在考虑可持续运行的物联网消耗时确定有效太阳能电池板尺寸和成本的关键因素。本文通过研究商用太阳能电池板作为物联网应用的可持续能源的可行性来解决这些关键问题。提出了一种新的随机计算模型来描述一天中三个不同时区太阳辐照度的不可预测性。通过采用分布拟合模型,所提出的计算模型准确地确定了物联网应用可持续运行所需的太阳能电池板尺寸(cm$^{2}$)和电池板成本(印度卢比)。此外,所提出的模型结合了用户指定的太阳能电池板尺寸和成本的停电和可持续性概率评估。这些见解在能源效率和可持续性至关重要的环境中具有重要意义。给出了数值结果来验证推导的分布模型和可持续物联网应用的性能指标。通过与基线模型的比较,验证了该模型的有效性和准确性。
{"title":"Stochastic Computation Model for Solar Panel Size and Cost of Sustainable IoT Networks","authors":"Atul Banotra;Deepak Mishra;Sudhakar Modem","doi":"10.1109/TSUSC.2024.3443450","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3443450","url":null,"abstract":"The Internet of Things (IoT) applications require uninterrupted network operation which is often hindered by battery energy constraints. Literature suggests that solar energy harvesting is a promising approach to powering IoT devices in a sustainable manner. However, the available literature overlooks key factors of determining effective solar panel size and cost while considering the IoT consumption for sustainable operation. This article tackles these pivotal aspects by investigating viability of commercially available solar panels as a sustainable energy source for IoT applications. A novel stochastic computation model is introduced to characterize the unpredictability of solar irradiance across three different time regions of the day. By employing distribution fitting models, the proposed computation model accurately determines the required solar panel size in cm<inline-formula><tex-math>$^{2}$</tex-math></inline-formula> and panel cost in Indian Rupees for the sustainable operation of the IoT application. Further, the proposed model incorporates the assessment of outage and sustainability probabilities for user-specified solar panel size and cost. These insights are significant in settings where energy efficiency and sustainability are crucial. Numerical results are presented to validate the derived distribution models and performance metrics for sustainable IoT applications. The effectiveness and accuracy of the proposed model are validated by comparing results with baseline model.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 2","pages":"317-332"},"PeriodicalIF":3.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143769461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems 作战系统中物联网集成的网络安全解决方案和技术
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-14 DOI: 10.1109/TSUSC.2024.3443256
Amirmohammad Pasdar;Nickolaos Koroniotis;Marwa Keshk;Nour Moustafa;Zahir Tari
The Internet of Things (IoT) has enabled pervasive networking and multi-modal sensing, offering various services such as remote operations and augmenting existing processes. The military setting has increasingly and notably adopted IoT technologies, such as sensor-rich drones or autonomous vehicles, which provide military personnel with enhanced situational awareness, faster decision-making capabilities, and improved operational precision. However, integrating IoT into military systems introduces new security challenges due to increased connectivity and susceptibility to vulnerabilities. Cyberattacks on military IoT systems can have severe consequences, including operational disruptions and compromises of sensitive information. This article proposes a new perspective on examining threat models in IoT-enhanced combat systems, emphasising approaches for identifying threats, conducting vulnerability assessments, and suggesting countermeasures. It delves into the characteristics and structures of IoT-enhanced combat systems, exploring technical implementations and technologies. Additionally, it outlines five significant areas of focus, including blockchain, machine learning, game theory, protocols, and algorithms, to enhance understanding of IoT-enhanced combat systems. The insights gained from this analysis can inform the development of secure and resilient military IoT systems, ultimately enhancing the safety and effectiveness of military operations.
物联网(IoT)实现了无处不在的网络和多模态传感,提供了远程操作和增强现有流程等各种服务。军事环境越来越多地采用物联网技术,如传感器丰富的无人机或自动驾驶汽车,这些技术为军事人员提供了增强的态势感知、更快的决策能力和更高的作战精度。然而,将物联网集成到军事系统中,由于连接性和脆弱性的增加,会带来新的安全挑战。对军事物联网系统的网络攻击可能会造成严重后果,包括运营中断和敏感信息泄露。本文提出了在物联网增强的作战系统中检查威胁模型的新视角,强调了识别威胁、进行脆弱性评估和提出对策的方法。深入研究物联网增强作战系统的特点和结构,探索技术实现和技术。此外,它概述了五个重要的重点领域,包括区块链、机器学习、博弈论、协议和算法,以增强对物联网增强作战系统的理解。从这一分析中获得的见解可以为安全、有弹性的军事物联网系统的开发提供信息,最终提高军事行动的安全性和有效性。
{"title":"Cybersecurity Solutions and Techniques for Internet of Things Integration in Combat Systems","authors":"Amirmohammad Pasdar;Nickolaos Koroniotis;Marwa Keshk;Nour Moustafa;Zahir Tari","doi":"10.1109/TSUSC.2024.3443256","DOIUrl":"https://doi.org/10.1109/TSUSC.2024.3443256","url":null,"abstract":"The Internet of Things (IoT) has enabled pervasive networking and multi-modal sensing, offering various services such as remote operations and augmenting existing processes. The military setting has increasingly and notably adopted IoT technologies, such as sensor-rich drones or autonomous vehicles, which provide military personnel with enhanced situational awareness, faster decision-making capabilities, and improved operational precision. However, integrating IoT into military systems introduces new security challenges due to increased connectivity and susceptibility to vulnerabilities. Cyberattacks on military IoT systems can have severe consequences, including operational disruptions and compromises of sensitive information. This article proposes a new perspective on examining threat models in IoT-enhanced combat systems, emphasising approaches for identifying threats, conducting vulnerability assessments, and suggesting countermeasures. It delves into the characteristics and structures of IoT-enhanced combat systems, exploring technical implementations and technologies. Additionally, it outlines five significant areas of focus, including blockchain, machine learning, game theory, protocols, and algorithms, to enhance understanding of IoT-enhanced combat systems. The insights gained from this analysis can inform the development of secure and resilient military IoT systems, ultimately enhancing the safety and effectiveness of military operations.","PeriodicalId":13268,"journal":{"name":"IEEE Transactions on Sustainable Computing","volume":"10 2","pages":"345-365"},"PeriodicalIF":3.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143769463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Sustainable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1