首页 > 最新文献

International Journal of Communication Systems最新文献

英文 中文
NOMA‐based precoded quadrature spatial modulation in multiuser MIMO downlink transmission over correlated channel 基于 NOMA 的预编码正交空间调制在相关信道上的多用户 MIMO 下行链路传输中的应用
IF 2.1 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-08-02 DOI: 10.1002/dac.5931
Shekhar Pratap Singh, Pyari Mohan Pradhan
SummaryIn this paper, a non‐orthogonal multiple access (NOMA)‐based precoded quadrature spatial modulation (PQSM) technique (NOMA‐PQSM) has been proposed for the downlink scenario. In NOMA‐PQSM, two intended receiving antennas are activated at any time instant. One antenna is activated for the in‐phase component of the transmitted signal, and another one is activated for the quadrature phase component, on the basis of data bits. NOMA‐PQSM provides benefits like improved spatial diversity and spectral efficiency in comparison with spatial modulation. This work uses zero forcing (ZF) precoding over downlink flat fading Rayleigh multiple input multiple output (MIMO) channels, to limit the channel's deteriorating effect on transmitted signal, assuming perfect channel state information (CSI) at the transmitter. A low complexity receiver based on the successive interference cancellation is used. An expression for the upper bound of average bit error probability is derived. Moreover, the expressions for the sum mutual information of users and its lower bound are also derived. The proposed scheme is compared with the preprocessing aided spatial modulation (PSM)‐based counterpart. Monte Carlo simulations reveal that the NOMA‐PQSM scheme outperforms its orthogonal counterpart and the PSM scheme.
摘要本文针对下行链路场景提出了一种基于非正交多址(NOMA)的预编码正交空间调制(PQSM)技术(NOMA-PQSM)。在 NOMA-PQSM 中,两个预定接收天线在任何时间瞬间都会被激活。根据数据比特,一个天线为传输信号的同相分量激活,另一个为正交相位分量激活。与空间调制相比,NOMA-PQSM 具有更高的空间分集和频谱效率等优点。这项研究在下行平衰落瑞利多输入多输出(MIMO)信道上使用零强迫(ZF)预编码,以限制信道对传输信号的恶化影响,同时假定发射机具有完美的信道状态信息(CSI)。使用了基于连续干扰消除的低复杂度接收器。推导出了平均比特误差概率的上限表达式。此外,还推导出了用户互信息总和及其下限的表达式。建议的方案与基于预处理辅助空间调制(PSM)的方案进行了比较。蒙特卡罗模拟显示,NOMA-PQSM 方案优于正交方案和 PSM 方案。
{"title":"NOMA‐based precoded quadrature spatial modulation in multiuser MIMO downlink transmission over correlated channel","authors":"Shekhar Pratap Singh, Pyari Mohan Pradhan","doi":"10.1002/dac.5931","DOIUrl":"https://doi.org/10.1002/dac.5931","url":null,"abstract":"SummaryIn this paper, a non‐orthogonal multiple access (NOMA)‐based precoded quadrature spatial modulation (PQSM) technique (NOMA‐PQSM) has been proposed for the downlink scenario. In NOMA‐PQSM, two intended receiving antennas are activated at any time instant. One antenna is activated for the in‐phase component of the transmitted signal, and another one is activated for the quadrature phase component, on the basis of data bits. NOMA‐PQSM provides benefits like improved spatial diversity and spectral efficiency in comparison with spatial modulation. This work uses zero forcing (ZF) precoding over downlink flat fading Rayleigh multiple input multiple output (MIMO) channels, to limit the channel's deteriorating effect on transmitted signal, assuming perfect channel state information (CSI) at the transmitter. A low complexity receiver based on the successive interference cancellation is used. An expression for the upper bound of average bit error probability is derived. Moreover, the expressions for the sum mutual information of users and its lower bound are also derived. The proposed scheme is compared with the preprocessing aided spatial modulation (PSM)‐based counterpart. Monte Carlo simulations reveal that the NOMA‐PQSM scheme outperforms its orthogonal counterpart and the PSM scheme.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141886995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compact planar 28/60‐GHz wideband MIMO antenna for 5G‐enabled IoT devices 适用于 5G 物联网设备的 28/60-GHz 宽带 MIMO 紧凑型平面天线
IF 2.1 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-08-02 DOI: 10.1002/dac.5932
Umar Farooq, Anjaneyulu Lokam, Sandhya Mallavarapu
SummaryThis work presents a compact two‐element multi‐input‐multi‐output (MIMO) antenna for 5G‐enabled IoT devices. The antenna operates over a wide frequency range of 24.6 to 31.4 GHz (28‐GHz band) and 57.6 to 60.2 GHz (60‐GHz band). Each MIMO element consists of an inverted L‐shaped slotted radiator with a partial ground plane. The antenna offers a peak gain of 5.45 and 5.56 dBi across two operating bands. The minimum isolation between the two ports is −26.5 dB, reaching a maximum value of over −45 dB. The investigation of MIMO metrics like “envelope correlation coefficient (ECC),” “diversity gain (DG),” “mean effective gain (MEG),” “channel capacity loss (CCL),” and “total active reflection coefficient (TARC)” also show favorable characteristics. The antenna is fabricated on a 10 × 22 × 0.503 mm3 Rogers 5880 substrate. The experimental results are in close agreement with that of the simulation results. The distinguishing features of the proposed antenna such as its compact design, simple geometrical configuration, wide operating bandwidth, low ECC, and high isolation make it a strong candidate for 5G‐enabled IoT devices.
摘要这项研究为支持 5G 的物联网设备提出了一种紧凑型双元件多输入多输出 (MIMO) 天线。该天线可在 24.6 至 31.4 GHz(28-GHz 频段)和 57.6 至 60.2 GHz(60-GHz 频段)的宽频率范围内工作。每个 MIMO 元件都由一个带部分接地平面的倒 L 形开槽辐射器组成。该天线在两个工作频段的峰值增益分别为 5.45 和 5.56 dBi。两个端口之间的最小隔离度为-26.5 dB,最大值超过-45 dB。对 "包络相关系数(ECC)"、"分集增益(DG)"、"平均有效增益(MEG)"、"信道容量损失(CCL)"和 "总有源反射系数(TARC)"等 MIMO 指标的研究也显示出良好的特性。天线是在 10 × 22 × 0.503 mm3 的罗杰斯 5880 衬底上制作的。实验结果与仿真结果非常吻合。该天线具有设计紧凑、几何配置简单、工作带宽宽、ECC 低和隔离度高等显著特点,是 5G 物联网设备的理想选择。
{"title":"Compact planar 28/60‐GHz wideband MIMO antenna for 5G‐enabled IoT devices","authors":"Umar Farooq, Anjaneyulu Lokam, Sandhya Mallavarapu","doi":"10.1002/dac.5932","DOIUrl":"https://doi.org/10.1002/dac.5932","url":null,"abstract":"SummaryThis work presents a compact two‐element multi‐input‐multi‐output (MIMO) antenna for 5G‐enabled IoT devices. The antenna operates over a wide frequency range of 24.6 to 31.4 GHz (28‐GHz band) and 57.6 to 60.2 GHz (60‐GHz band). Each MIMO element consists of an inverted L‐shaped slotted radiator with a partial ground plane. The antenna offers a peak gain of 5.45 and 5.56 dBi across two operating bands. The minimum isolation between the two ports is −26.5 dB, reaching a maximum value of over −45 dB. The investigation of MIMO metrics like “envelope correlation coefficient (ECC),” “diversity gain (DG),” “mean effective gain (MEG),” “channel capacity loss (CCL),” and “total active reflection coefficient (TARC)” also show favorable characteristics. The antenna is fabricated on a 10 × 22 × 0.503 mm<jats:sup>3</jats:sup> Rogers 5880 substrate. The experimental results are in close agreement with that of the simulation results. The distinguishing features of the proposed antenna such as its compact design, simple geometrical configuration, wide operating bandwidth, low ECC, and high isolation make it a strong candidate for 5G‐enabled IoT devices.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141881012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bilevel access control and constraint‐aware response provisioning in edge‐enabled software defined network‐internet of things network using the safeguard authentication dynamic access control model 利用保障认证动态访问控制模型在边缘软件定义网络-物联网网络中实现双层访问控制和约束感知响应配置
IF 2.1 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-08-01 DOI: 10.1002/dac.5946
Sahana D S, Brahmananda S H
SummaryBy controlling the network, the Internet of Things (IoT)‐connected software‐defined network (SDN) limits the scalability of IoT devices. Since SDN depends on a centralized controller that attackers can easily affect, it is incredibly susceptible to attacks. Secure access control to the SDN controller was the focus of the prior methods for controller scalability and restricted trust management. A framework called Safeguard Authentication Dynamic Access Control (SANDMAC) is suggested to safeguard and offer useful services to enterprises. Authentication confirms legitimacy after all users and applications have been registered. To improve network security, policies let users grant access to account attributes, legal activities, and temporal components. The administrator lessens conflicts between the methods by validating and saving the policies in the database. The services are provided to dependable customers using the forensic‐based investigation algorithm, depending on the quality of service and software level agreements requirements, decreasing reaction times and maximizing resource usage. Performance comparisons between the new and previous efforts are validated using a variety of parameters, and the proposed work is validated using the iFogSim application. According to the findings, SANDMAC significantly raises key performance indicators. SANDMAC specifically keeps false positives at 3.5% and accomplishes a low response time of 60 ms for roughly 800 authorized accesses. SANDMAC is a better option because of these enhancements, which result in longer network lifetimes and more dependable data transmission.
摘要 通过控制网络,与物联网(IoT)相连的软件定义网络(SDN)限制了物联网设备的可扩展性。由于 SDN 依赖于攻击者可以轻易影响的集中式控制器,因此极易受到攻击。对 SDN 控制器的安全访问控制是先前控制器可扩展性和受限信任管理方法的重点。建议采用一种名为 "安全认证动态访问控制"(SANDMAC)的框架,以保障安全并为企业提供有用的服务。所有用户和应用程序注册后,身份验证会确认其合法性。为提高网络安全性,策略允许用户授予账户属性、合法活动和时间组件的访问权限。管理员通过在数据库中验证和保存策略来减少方法之间的冲突。根据服务质量和软件级别协议的要求,使用基于取证的调查算法向可靠的客户提供服务,缩短反应时间,最大限度地提高资源利用率。使用各种参数对新的工作和以前的工作进行了性能比较,并使用 iFogSim 应用程序对拟议的工作进行了验证。根据研究结果,SANDMAC 显著提高了关键性能指标。具体而言,SANDMAC 将误报率控制在 3.5%,并在大约 800 次授权访问中实现了 60 毫秒的低响应时间。由于这些改进,SANDMAC 成为更好的选择,从而延长了网络寿命,提高了数据传输的可靠性。
{"title":"Bilevel access control and constraint‐aware response provisioning in edge‐enabled software defined network‐internet of things network using the safeguard authentication dynamic access control model","authors":"Sahana D S, Brahmananda S H","doi":"10.1002/dac.5946","DOIUrl":"https://doi.org/10.1002/dac.5946","url":null,"abstract":"SummaryBy controlling the network, the Internet of Things (IoT)‐connected software‐defined network (SDN) limits the scalability of IoT devices. Since SDN depends on a centralized controller that attackers can easily affect, it is incredibly susceptible to attacks. Secure access control to the SDN controller was the focus of the prior methods for controller scalability and restricted trust management. A framework called Safeguard Authentication Dynamic Access Control (SANDMAC) is suggested to safeguard and offer useful services to enterprises. Authentication confirms legitimacy after all users and applications have been registered. To improve network security, policies let users grant access to account attributes, legal activities, and temporal components. The administrator lessens conflicts between the methods by validating and saving the policies in the database. The services are provided to dependable customers using the forensic‐based investigation algorithm, depending on the quality of service and software level agreements requirements, decreasing reaction times and maximizing resource usage. Performance comparisons between the new and previous efforts are validated using a variety of parameters, and the proposed work is validated using the iFogSim application. According to the findings, SANDMAC significantly raises key performance indicators. SANDMAC specifically keeps false positives at 3.5% and accomplishes a low response time of 60 ms for roughly 800 authorized accesses. SANDMAC is a better option because of these enhancements, which result in longer network lifetimes and more dependable data transmission.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141881090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach for missing data recovery and fault nodes detection in wireless sensor networks 无线传感器网络中缺失数据恢复和故障节点检测的新方法
IF 2.1 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-08-01 DOI: 10.1002/dac.5924
R. Thiyagarajan, N. Nagabhooshanam, K.D.V. Prasad, P. Poojitha
SummaryEnsuring data integrity in wireless sensor networks (WSNs) is crucial for accurate monitoring, yet missing data due to sensor faults present a significant challenge. This research introduces an innovative approach that integrates advanced data recovery techniques with leading‐edge methods to address this issue. The system begins by identifying and isolating fault nodes using a specialized algorithm that analyzes network behavior. By applying fuzzy density‐based spatial clustering of applications with noise (FDBSCAN), potential fault nodes are precisely located based on deviations from expected patterns. Subsequently, an intelligent missing data recovery mechanism powered by bidirectional long short‐term memory (Bi‐LSTM) networks takes action. The Bi‐LSTM model is trained on existing sensor data to capture intricate patterns and dependencies, enabling accurate prediction and reconstruction of missing values caused by identified faults. The synergy between Bi‐LSTM for missing data recovery and FDBSCAN for fault node detection comprehensively addresses the missing data problem in WSNs. In missing data recovery, it demonstrates low mean absolute deviation (MAD) ranging from 0.021 to 0.13 and mean squared deviation (MSD) ranging from 0.0025 to 0.05 across various missing data ratios. Data reliability remains consistently high at 96% to 98%, even with up to 80% missing data. For fault node detection, the approach achieves precision of 95.7%, recall of 96.3%, F1‐score of 96.1%, and accuracy of 97.4%, outperforming existing techniques. The computational cost during training is noted at 5.79 h, presenting a limitation compared to other methods. This research highlights the importance of integrating fault node detection into missing data recovery mechanisms, presenting an innovative solution for the advancement of WSNs.
摘要确保无线传感器网络(WSN)中的数据完整性对于准确监测至关重要,但传感器故障导致的数据丢失是一个重大挑战。这项研究引入了一种创新方法,将先进的数据恢复技术与前沿方法相结合,以解决这一问题。该系统首先使用一种分析网络行为的专门算法来识别和隔离故障节点。通过应用基于模糊密度的噪声应用空间聚类(FDBSCAN),根据与预期模式的偏差精确定位潜在的故障节点。随后,由双向长短期记忆(Bi-LSTM)网络驱动的智能缺失数据恢复机制就会发挥作用。Bi-LSTM 模型在现有传感器数据上进行训练,以捕捉错综复杂的模式和依赖关系,从而准确预测和重建由已识别故障引起的缺失值。用于缺失数据恢复的 Bi-LSTM 与用于故障节点检测的 FDBSCAN 的协同作用全面解决了 WSN 中的缺失数据问题。在缺失数据恢复方面,在各种缺失数据比率下,其平均绝对偏差(MAD)从 0.021 到 0.13 不等,平均平方差(MSD)从 0.0025 到 0.05 不等。即使数据缺失率高达 80%,数据可靠性也始终保持在 96% 至 98% 的高水平。在故障节点检测方面,该方法的精确度为 95.7%,召回率为 96.3%,F1 分数为 96.1%,准确率为 97.4%,优于现有技术。训练期间的计算成本为 5.79 小时,与其他方法相比存在局限性。这项研究强调了将故障节点检测整合到丢失数据恢复机制中的重要性,为 WSN 的发展提供了一种创新的解决方案。
{"title":"A novel approach for missing data recovery and fault nodes detection in wireless sensor networks","authors":"R. Thiyagarajan, N. Nagabhooshanam, K.D.V. Prasad, P. Poojitha","doi":"10.1002/dac.5924","DOIUrl":"https://doi.org/10.1002/dac.5924","url":null,"abstract":"SummaryEnsuring data integrity in wireless sensor networks (WSNs) is crucial for accurate monitoring, yet missing data due to sensor faults present a significant challenge. This research introduces an innovative approach that integrates advanced data recovery techniques with leading‐edge methods to address this issue. The system begins by identifying and isolating fault nodes using a specialized algorithm that analyzes network behavior. By applying fuzzy density‐based spatial clustering of applications with noise (FDBSCAN), potential fault nodes are precisely located based on deviations from expected patterns. Subsequently, an intelligent missing data recovery mechanism powered by bidirectional long short‐term memory (Bi‐LSTM) networks takes action. The Bi‐LSTM model is trained on existing sensor data to capture intricate patterns and dependencies, enabling accurate prediction and reconstruction of missing values caused by identified faults. The synergy between Bi‐LSTM for missing data recovery and FDBSCAN for fault node detection comprehensively addresses the missing data problem in WSNs. In missing data recovery, it demonstrates low mean absolute deviation (MAD) ranging from 0.021 to 0.13 and mean squared deviation (MSD) ranging from 0.0025 to 0.05 across various missing data ratios. Data reliability remains consistently high at 96% to 98%, even with up to 80% missing data. For fault node detection, the approach achieves precision of 95.7%, recall of 96.3%, F1‐score of 96.1%, and accuracy of 97.4%, outperforming existing techniques. The computational cost during training is noted at 5.79 h, presenting a limitation compared to other methods. This research highlights the importance of integrating fault node detection into missing data recovery mechanisms, presenting an innovative solution for the advancement of WSNs.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141881092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metaheuristic optimization‐based clustering with routing protocol in wireless sensor networks 无线传感器网络中基于元搜索优化的聚类与路由协议
IF 2.1 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-31 DOI: 10.1002/dac.5914
Chinnarao Kurangi, Kiran Kumar Paidipati, A. Siva Krishna Reddy, Jayasankar Uthayakumar, Ganesan Kadiravan, Shabana Parveen
SummaryIn recent years, the use of wireless sensor devices in several applications, for example, monitoring in dangerous geographical spaces and the Internet of Things, has dramatically increased. Though sensor nodes (SNs) have limited power, battery replacement is not feasible in most cases. Therefore, energy saving in wireless sensor networks (WSN) is the major concern in the design of effective transmission protocol. Clustering might lower energy usage and increase network lifetime. Routing protocol for WSN represents an engineering area that has gained considerable interest among researchers due to its rapid evolution and development. Among them, the clustering routing protocol corresponds to the most effective technique to manage the energy consumption of each SN. In this manuscript, we focus on the design of a new metaheuristic optimization‐based energy‐aware clustering with routing protocol for lifetime maximization (MOEACR‐LM) method in WSN. The purpose of the MOEACR‐LM method is to improve network efficiency via proper selection of cluster heads (CHs) and effective data transmission. Initially, a hunter–prey optimization (HPO) method‐based clustering technique is used for cluster construction and the CH selection process. Next, the clouded leopard optimization (CLO) model is used for the route selection process in WSN. The HPO and CLO models derive a fitness function involving multiple parameters for clustering and routing processes. A comprehensive experimental analysis is carried out to demonstrate the enhanced performance of the MOEACR‐LM technique. The overall comparison study pointed out the improved energy efficiency results of the MOEACR‐LM technique over other existing approaches.
摘要 近年来,无线传感器设备在危险地理空间监测和物联网等多个应用领域的使用急剧增加。虽然传感器节点(SN)的功率有限,但在大多数情况下更换电池是不可行的。因此,在设计有效的传输协议时,无线传感器网络(WSN)的节能是主要关注点。集群可以降低能量消耗,延长网络寿命。WSN 的路由协议是一个工程领域,由于其快速的演变和发展,已经引起了研究人员的极大兴趣。其中,聚类路由协议是管理每个 SN 能量消耗的最有效技术。在本手稿中,我们重点讨论了在 WSN 中设计一种新的基于元启发式优化的能量感知聚类路由协议寿命最大化(MOEACR-LM)方法。MOEACR-LM 方法的目的是通过正确选择簇头(CHs)和有效的数据传输来提高网络效率。首先,基于猎人-猎物优化(HPO)方法的聚类技术被用于簇的构建和 CH 的选择过程。接着,云豹优化(CLO)模型被用于 WSN 的路由选择过程。HPO 和 CLO 模型为聚类和路由选择过程推导出了一个涉及多个参数的适合度函数。为证明 MOEACR-LM 技术的增强性能,进行了全面的实验分析。整体比较研究表明,MOEACR-LM 技术的能效结果优于其他现有方法。
{"title":"Metaheuristic optimization‐based clustering with routing protocol in wireless sensor networks","authors":"Chinnarao Kurangi, Kiran Kumar Paidipati, A. Siva Krishna Reddy, Jayasankar Uthayakumar, Ganesan Kadiravan, Shabana Parveen","doi":"10.1002/dac.5914","DOIUrl":"https://doi.org/10.1002/dac.5914","url":null,"abstract":"SummaryIn recent years, the use of wireless sensor devices in several applications, for example, monitoring in dangerous geographical spaces and the Internet of Things, has dramatically increased. Though sensor nodes (SNs) have limited power, battery replacement is not feasible in most cases. Therefore, energy saving in wireless sensor networks (WSN) is the major concern in the design of effective transmission protocol. Clustering might lower energy usage and increase network lifetime. Routing protocol for WSN represents an engineering area that has gained considerable interest among researchers due to its rapid evolution and development. Among them, the clustering routing protocol corresponds to the most effective technique to manage the energy consumption of each SN. In this manuscript, we focus on the design of a new metaheuristic optimization‐based energy‐aware clustering with routing protocol for lifetime maximization (MOEACR‐LM) method in WSN. The purpose of the MOEACR‐LM method is to improve network efficiency via proper selection of cluster heads (CHs) and effective data transmission. Initially, a hunter–prey optimization (HPO) method‐based clustering technique is used for cluster construction and the CH selection process. Next, the clouded leopard optimization (CLO) model is used for the route selection process in WSN. The HPO and CLO models derive a fitness function involving multiple parameters for clustering and routing processes. A comprehensive experimental analysis is carried out to demonstrate the enhanced performance of the MOEACR‐LM technique. The overall comparison study pointed out the improved energy efficiency results of the MOEACR‐LM technique over other existing approaches.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141866888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic and efficient resource allocation for 5G end‐to‐end network slicing: A multi‐agent deep reinforcement learning approach 5G 端到端网络切片的动态高效资源分配:多代理深度强化学习方法
IF 2.1 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-31 DOI: 10.1002/dac.5916
Muhammad Asim Ejaz, Guowei Wu, Tahir Iqbal
SummaryThe rapid evolution of user equipment (UE) and 5G networks drives significant transformations, bringing technology closer to end‐users. Managing resources in densely crowded areas such as airports, train stations, and bus terminals poses challenges due to diverse user demands. Integrating mobile edge computing (MEC) and network function virtualization (NFV) becomes vital when the service provider's (SP) primary goal is maximizing profitability while maintaining service level agreement (SLA). Considering these challenges, our study addresses an online resource allocation problem in an MEC network where computing resources are limited, and the SP aims to boost profit by securely admitting more UE requests at each time slot. Each UE request arrival rate is unknown, and the requirement is specific resources with minimum cost and delay. The optimization problem objective is achieved by allocating resources to requests at the MEC network in appropriate cloudlets, utilizing abandoned instances, reutilizing idle and soft slice instances to shorten delay and reduce costs, and immediately scaling inappropriate instances, thus minimizing the instantiation of new instances. This paper proposes a deep reinforcement learning (DRL) method for request prediction and resource allocation to mitigate unnecessary resource waste. Simulation results demonstrate that the proposed approach effectively accepts network slice requests to maximize profit by leveraging resource availability, reutilizing instantiated resources, and upholding goodwill and SLA. Through extensive simulations, we show that our proposed DRL‐based approach outperforms other state‐of‐the‐art techniques, namely, MaxSR, DQN, and DDPG, by 76%, 33%, and 23%, respectively.
摘要用户设备(UE)和 5G 网络的快速发展推动了重大变革,使技术更贴近终端用户。由于用户需求各不相同,在机场、火车站和公共汽车终点站等人群密集区域管理资源面临着挑战。当服务提供商(SP)的首要目标是在保持服务水平协议(SLA)的同时实现利润最大化时,移动边缘计算(MEC)和网络功能虚拟化(NFV)的整合就变得至关重要。考虑到这些挑战,我们的研究解决了计算资源有限的 MEC 网络中的在线资源分配问题,SP 的目标是通过在每个时隙安全地接受更多的 UE 请求来提高利润。每个 UE 请求的到达率是未知的,要求以最小的成本和延迟获得特定的资源。为了实现优化问题的目标,需要在 MEC 网络中的适当小云中为请求分配资源,利用放弃的实例,重新利用空闲和软切片实例以缩短延迟和降低成本,并立即缩减不合适的实例,从而最大限度地减少新实例的实例化。本文提出了一种用于请求预测和资源分配的深度强化学习(DRL)方法,以减少不必要的资源浪费。仿真结果表明,所提出的方法能有效地接受网络分片请求,通过利用资源可用性、重新利用实例资源以及维护商誉和服务水平协议来实现利润最大化。通过大量仿真,我们发现所提出的基于 DRL 的方法优于其他最先进的技术,即 MaxSR、DQN 和 DDPG,分别高出 76%、33% 和 23%。
{"title":"Dynamic and efficient resource allocation for 5G end‐to‐end network slicing: A multi‐agent deep reinforcement learning approach","authors":"Muhammad Asim Ejaz, Guowei Wu, Tahir Iqbal","doi":"10.1002/dac.5916","DOIUrl":"https://doi.org/10.1002/dac.5916","url":null,"abstract":"SummaryThe rapid evolution of user equipment (UE) and 5G networks drives significant transformations, bringing technology closer to end‐users. Managing resources in densely crowded areas such as airports, train stations, and bus terminals poses challenges due to diverse user demands. Integrating mobile edge computing (MEC) and network function virtualization (NFV) becomes vital when the service provider's (SP) primary goal is maximizing profitability while maintaining service level agreement (SLA). Considering these challenges, our study addresses an online resource allocation problem in an MEC network where computing resources are limited, and the SP aims to boost profit by securely admitting more UE requests at each time slot. Each UE request arrival rate is unknown, and the requirement is specific resources with minimum cost and delay. The optimization problem objective is achieved by allocating resources to requests at the MEC network in appropriate cloudlets, utilizing abandoned instances, reutilizing idle and soft slice instances to shorten delay and reduce costs, and immediately scaling inappropriate instances, thus minimizing the instantiation of new instances. This paper proposes a deep reinforcement learning (DRL) method for request prediction and resource allocation to mitigate unnecessary resource waste. Simulation results demonstrate that the proposed approach effectively accepts network slice requests to maximize profit by leveraging resource availability, reutilizing instantiated resources, and upholding goodwill and SLA. Through extensive simulations, we show that our proposed DRL‐based approach outperforms other state‐of‐the‐art techniques, namely, MaxSR, DQN, and DDPG, by 76<jats:italic>%</jats:italic>, 33<jats:italic>%</jats:italic>, and 23<jats:italic>%</jats:italic>, respectively.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141866807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of the congestion severity aware rate regulation (CSRR) algorithm in wireless body area networks 无线体域网络中拥塞严重程度感知速率调节(CSRR)算法的性能评估
IF 1.7 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-31 DOI: 10.1002/dac.5892
Vamsi kiran Mekatohti, Nithya B

Wireless body area network (WBAN) is a potential low-cost technology for privacy-sensitive telemedicine and e-health monitoring and services. However, it faces limited protocol and physical resource support challenges, which can result in packet transfer difficulties. In particular, WBAN requires an emergency-aware technology that ensures a promising quality of service (QoS). One significant issue affecting QoS and energy efficiency in WBAN is congestion. Effective congestion control techniques are essential for achieving proper load balancing. To address these challenges, we propose a congestion severity aware rate control (CSRR) algorithm that enhances packet transmission rate by reducing packet losses and retransmissions. The CSRR algorithm incorporates a fuzzy controller to predict congestion rates based on runtime metrics. To regulate congestion window growth in different algorithm phases, we introduce sequences such as the Fibonacci retracement sequence, knight's move sequence, and the binary logarithm of the Nth primorial sequence to regulate congestion window growth in the different phases of the proposed algorithm. We mathematically analyze the proposed CSRR algorithm using a Markov model. The simulation results demonstrate the superiority of our algorithm compared to existing approaches. Specifically, our algorithm achieves significant optimizations in terms of throughput (52.92%), packet loss (38.11%), delay (37.23%), and remaining energy (36.86%) when compared to existing algorithms.

摘要无线体域网(WBAN)是一种潜在的低成本技术,可用于对隐私敏感的远程医疗和电子健康监测与服务。然而,它面临着协议和物理资源支持有限的挑战,可能导致数据包传输困难。WBAN 尤其需要一种能确保良好服务质量(QoS)的应急感知技术。影响无线局域网服务质量和能源效率的一个重要问题是拥塞。有效的拥塞控制技术对于实现适当的负载平衡至关重要。为应对这些挑战,我们提出了一种拥塞严重程度感知速率控制(CSRR)算法,通过减少数据包丢失和重传来提高数据包传输速率。CSRR 算法采用模糊控制器,根据运行时指标预测拥塞率。为了调节不同算法阶段的拥塞窗口增长,我们引入了斐波纳契回撤序列、马的移动序列和初等序列的二进制对数等序列,以调节拟议算法不同阶段的拥塞窗口增长。我们利用马尔可夫模型对所提出的 CSRR 算法进行了数学分析。仿真结果表明,与现有方法相比,我们的算法更具优势。具体来说,与现有算法相比,我们的算法在吞吐量(52.92%)、数据包丢失(38.11%)、延迟(37.23%)和剩余能量(36.86%)方面实现了显著优化。
{"title":"Performance evaluation of the congestion severity aware rate regulation (CSRR) algorithm in wireless body area networks","authors":"Vamsi kiran Mekatohti,&nbsp;Nithya B","doi":"10.1002/dac.5892","DOIUrl":"10.1002/dac.5892","url":null,"abstract":"<div>\u0000 \u0000 <p>Wireless body area network (WBAN) is a potential low-cost technology for privacy-sensitive telemedicine and e-health monitoring and services. However, it faces limited protocol and physical resource support challenges, which can result in packet transfer difficulties. In particular, WBAN requires an emergency-aware technology that ensures a promising quality of service (QoS). One significant issue affecting QoS and energy efficiency in WBAN is congestion. Effective congestion control techniques are essential for achieving proper load balancing. To address these challenges, we propose a congestion severity aware rate control (CSRR) algorithm that enhances packet transmission rate by reducing packet losses and retransmissions. The CSRR algorithm incorporates a fuzzy controller to predict congestion rates based on runtime metrics. To regulate congestion window growth in different algorithm phases, we introduce sequences such as the Fibonacci retracement sequence, knight's move sequence, and the binary logarithm of the \u0000<span></span><math>\u0000 <msup>\u0000 <mi>N</mi>\u0000 <mi>th</mi>\u0000 </msup></math> primorial sequence to regulate congestion window growth in the different phases of the proposed algorithm. We mathematically analyze the proposed CSRR algorithm using a Markov model. The simulation results demonstrate the superiority of our algorithm compared to existing approaches. Specifically, our algorithm achieves significant optimizations in terms of throughput (52.92%), packet loss (38.11%), delay (37.23%), and remaining energy (36.86%) when compared to existing algorithms.</p>\u0000 </div>","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":1.7,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141873429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph neural networks based queuing model for optimal load balancing in mobile ad hoc network 基于图神经网络的队列模型,用于优化移动特设网络的负载平衡
IF 2.1 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-30 DOI: 10.1002/dac.5922
G. Rajiv Suresh Kumar, G. Arul Geetha
SummaryThis paper proposes a new approach for optimizing traffic management in multiple access networks (MANETs) by utilizing the stream‐enabled routing (SER) algorithm. The SER algorithm is used to determine which routing path is the most time‐ and resource‐efficient. The proposed approach makes use of multipath routing in a manner that is consistent with the SER method. By combining the states of flows, queues, and links, a graph neural network (GNN)‐based model attempts to break the circular dependencies that are described by these functions. The simulation is setup with joint parameters consisting of residual energy, packet delivery rate (PDR), and end‐to‐end delay. The results of the experiments show that the proposed protocol provides a significant improvement in terms of network efficiency when compared to using some baseline protocols designed for MANETs.
摘要 本文提出了一种新方法,利用流路由(SER)算法优化多接入网络(MANET)中的流量管理。SER 算法用于确定哪条路由路径最节省时间和资源。所提出的方法以与 SER 方法一致的方式利用了多路径路由。通过结合流量、队列和链路的状态,基于图神经网络(GNN)的模型试图打破这些函数所描述的循环依赖关系。仿真设置的联合参数包括剩余能量、数据包交付率(PDR)和端到端延迟。实验结果表明,与使用一些专为城域网设计的基线协议相比,所提出的协议在网络效率方面有显著提高。
{"title":"Graph neural networks based queuing model for optimal load balancing in mobile ad hoc network","authors":"G. Rajiv Suresh Kumar, G. Arul Geetha","doi":"10.1002/dac.5922","DOIUrl":"https://doi.org/10.1002/dac.5922","url":null,"abstract":"SummaryThis paper proposes a new approach for optimizing traffic management in multiple access networks (MANETs) by utilizing the stream‐enabled routing (SER) algorithm. The SER algorithm is used to determine which routing path is the most time‐ and resource‐efficient. The proposed approach makes use of multipath routing in a manner that is consistent with the SER method. By combining the states of flows, queues, and links, a graph neural network (GNN)‐based model attempts to break the circular dependencies that are described by these functions. The simulation is setup with joint parameters consisting of residual energy, packet delivery rate (PDR), and end‐to‐end delay. The results of the experiments show that the proposed protocol provides a significant improvement in terms of network efficiency when compared to using some baseline protocols designed for MANETs.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141866813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast computation of radio wave diffraction effects 无线电波衍射效应的快速计算
IF 2.1 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-29 DOI: 10.1002/dac.5930
Thomas Mejstrik, Taulant Berisha, Sebastian Woblistin
SummaryUnmanned aerial vehicle operations are quickly gaining ground due to rapid global market penetration. While on one hand, novel technologies that bridge communication networks to aviation industry are yet to be explored, on the other hand, their development requires highly scalable systems to enable beyond visual line‐of‐sight missions. This requirement imposes a big bottleneck in terms of computation complexity. This paper presents a method for fast computation of multiple diffraction of radio waves over knife‐edge obstacles based on the Deygout technique and some offline computation steps, including a ground profile analysis. We prove that this algorithm is equivalent to the original Deygout algorithm for all non‐line‐of‐sight points, show heuristics confirming that it is mostly applicable in the line‐of‐sight case. The computational and memory complexity of our algorithm is approximately , compared to for the original Deygout algorithm. Finally we discuss how to apply the approach to the Epstein‐Peterson technique and the Giovanelli technique, and how to use it to compute clutter‐loss.
摘要 由于全球市场的快速渗透,无人驾驶飞行器的操作正迅速普及。一方面,将通信网络与航空业连接起来的新技术尚待探索,另一方面,这些技术的开发需要高度可扩展的系统,以实现超视距飞行任务。这一要求在计算复杂度方面造成了很大的瓶颈。本文介绍了一种基于戴高特技术和一些离线计算步骤(包括地面剖面分析)的快速计算刀刃障碍物上无线电波多重衍射的方法。我们证明,对于所有非视距点,该算法等同于原始的 Deygout 算法,并展示了启发式方法,证实该算法主要适用于视距情况。与原始的 Deygout 算法相比,我们的算法的计算和内存复杂度约为 。最后,我们讨论了如何将该方法应用于 Epstein-Peterson 技术和 Giovanelli 技术,以及如何使用该方法计算杂波损失。
{"title":"Fast computation of radio wave diffraction effects","authors":"Thomas Mejstrik, Taulant Berisha, Sebastian Woblistin","doi":"10.1002/dac.5930","DOIUrl":"https://doi.org/10.1002/dac.5930","url":null,"abstract":"SummaryUnmanned aerial vehicle operations are quickly gaining ground due to rapid global market penetration. While on one hand, novel technologies that bridge communication networks to aviation industry are yet to be explored, on the other hand, their development requires highly scalable systems to enable beyond visual line‐of‐sight missions. This requirement imposes a big bottleneck in terms of computation complexity. This paper presents a method for fast computation of multiple diffraction of radio waves over knife‐edge obstacles based on the Deygout technique and some offline computation steps, including a ground profile analysis. We prove that this algorithm is equivalent to the original Deygout algorithm for all non‐line‐of‐sight points, show heuristics confirming that it is mostly applicable in the line‐of‐sight case. The computational and memory complexity of our algorithm is approximately , compared to for the original Deygout algorithm. Finally we discuss how to apply the approach to the Epstein‐Peterson technique and the Giovanelli technique, and how to use it to compute clutter‐loss.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141872915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing spectral efficiency of green metric cognitive radio network using an adaptive optimization and communication protocol 利用自适应优化和通信协议提高绿色度量认知无线电网络的频谱效率
IF 2.1 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-29 DOI: 10.1002/dac.5929
Arvind Kumar, Sangeeta Kumari
SummaryInformation technology enables the process of spectral sensing and spectral efficiency (SE) with the help of different strategies attracted by researchers in cooperative cognitive radio networks (CCRN). Compared with other wireless technologies, spectral sharing in green metric CCRN (GMCCRN) is an effective strategy. Due to the collaboration between the unlicensed and licensed customers, the spectral sharing between the cooperative customers possesses various challenges. Here, the effectiveness of green CCRN is demonstrated through a variety of useful techniques. The proposed work designed a channel using Markov Gaussian wideband distribution (MGWD), and for communication, dynamic optimal relay‐based protocol (DORP) is used. Also, an effective optimization known as adaptive dynamic group‐based optimization algorithm (ADGCO) is used to examine the false alarm detection and finest spectral sensing. Finally, the effectiveness of GMCCRN is validated in terms of outage probability, spectral efficiency, energy efficiency, and throughput. Furthermore, the results revealed that the proposed method in CCRN reduces power consumption at both the secondary user (SU) and primary user (PU) sides. Also, the method maximized the throughput compared with existing schemes and achieved 0.3 as error prospect and 92.6% as accuracy.
摘要在合作认知无线电网络(CCRN)研究人员采用不同策略的帮助下,信息技术实现了频谱感知过程和频谱效率(SE)。与其他无线技术相比,绿色度量认知无线电网络(GMCCRN)中的频谱共享是一种有效的策略。由于非授权客户和授权客户之间的合作,合作客户之间的频谱共享面临着各种挑战。在这里,绿色 CCRN 的有效性通过各种有用的技术得到了证明。所提出的工作设计了一个使用马尔可夫高斯宽带分布(MGWD)的信道,并使用基于动态优化中继协议(DORP)进行通信。此外,还使用了一种有效的优化方法,即自适应动态分组优化算法(ADGCO),来检查误报检测和最精细的频谱感测。最后,从中断概率、频谱效率、能效和吞吐量方面验证了 GMCCRN 的有效性。此外,研究结果表明,CCRN 中提出的方法降低了次用户(SU)和主用户(PU)端的功耗。同时,与现有方案相比,该方法最大限度地提高了吞吐量,并实现了 0.3 的误差前景和 92.6% 的准确率。
{"title":"Enhancing spectral efficiency of green metric cognitive radio network using an adaptive optimization and communication protocol","authors":"Arvind Kumar, Sangeeta Kumari","doi":"10.1002/dac.5929","DOIUrl":"https://doi.org/10.1002/dac.5929","url":null,"abstract":"SummaryInformation technology enables the process of spectral sensing and spectral efficiency (SE) with the help of different strategies attracted by researchers in cooperative cognitive radio networks (CCRN). Compared with other wireless technologies, spectral sharing in green metric CCRN (GMCCRN) is an effective strategy. Due to the collaboration between the unlicensed and licensed customers, the spectral sharing between the cooperative customers possesses various challenges. Here, the effectiveness of green CCRN is demonstrated through a variety of useful techniques. The proposed work designed a channel using Markov Gaussian wideband distribution (MGWD), and for communication, dynamic optimal relay‐based protocol (DORP) is used. Also, an effective optimization known as adaptive dynamic group‐based optimization algorithm (ADGCO) is used to examine the false alarm detection and finest spectral sensing. Finally, the effectiveness of GMCCRN is validated in terms of outage probability, spectral efficiency, energy efficiency, and throughput. Furthermore, the results revealed that the proposed method in CCRN reduces power consumption at both the secondary user (SU) and primary user (PU) sides. Also, the method maximized the throughput compared with existing schemes and achieved 0.3 as error prospect and 92.6% as accuracy.","PeriodicalId":13946,"journal":{"name":"International Journal of Communication Systems","volume":null,"pages":null},"PeriodicalIF":2.1,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141866808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Communication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1