首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
Deep Adaptive Learning-Based Beam Combining Framework for 5G Millimeter-Wave Massive 3D-MIMO Uplink Systems 基于深度自适应学习的5G毫米波海量3D-MIMO上行系统波束组合框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-12-02 DOI: 10.1002/ett.70030
K. Mahendran, H. Sudarsan, S. Rathika, B. Shankarlal

In today's wireless communication systems, the integration of 5G millimeter-wave (mmWave) Massive Multiple Input–Multiple Output (M-MIMO) technology offers significant advancements and capabilities that address the growing demand for higher data rates, increased capacity, and improved user experiences. In three-dimensional (3D) environments, the design of beamforming for uplink multi-user M-MIMO relies on accurate uplink channel state information (CSI) at the transmitter/receiver. In fact, it is difficult for the Base Station (BS) and the User Equipment (UE) to obtain beam patterns due to computational complexity, multiple 3D beams, and regulating the weight of antenna elements, which leads to significantly low sum-rate. Hence, a robust, deep adaptive learning framework in the case of 3D beamforming is needed. This paper proposes a deep adaptive learning-based beam combining framework using User-Wise Attention-Assisted Deep Adaptive Neural Network (UWA-DANN) for mmWave-3DM-MIMO systems. In this, a UWA mechanism learns a set of beam features and corresponding weights for each user. This mechanism allows the system to focus on different users independently and adapt the beamforming process accordingly. Also, it allows the network to dynamically focus on relevant information from the input channels and user constraints. To this end, a dynamic beam pattern is adapted using the DANN model to learn user positions, channel measurements, and beamforming weights. This approach learns to map input parameters such as user positions, channel measurements, and corresponding beam patterns to extract relevant features for beam pattern adaptation. Thus, the UWA-DANN approach provides higher data rates, low complexity, and improved link stability for users. Experimental results show that the proposed UWA-DANN model obtains robust performance over existing schemes in terms of achievable rate and sum-rate under field trial sites in urban scenarios.

在当今的无线通信系统中,5G毫米波(mmWave)大规模多输入多输出(M-MIMO)技术的集成提供了显著的进步和功能,满足了对更高数据速率、更大容量和更好用户体验的不断增长的需求。在三维(3D)环境下,上行多用户M-MIMO的波束形成设计依赖于发送/接收端准确的上行信道状态信息(CSI)。实际上,由于计算复杂性、多个三维波束以及天线单元重量的调节,基站(BS)和用户设备(UE)难以获得波束方向图,导致和速率明显较低。因此,在三维波束形成的情况下,需要一个鲁棒的深度自适应学习框架。本文提出了一种基于深度自适应学习的波束组合框架,该框架使用用户智能注意辅助深度自适应神经网络(UWA-DANN)用于毫米波- 3dm - mimo系统。在这种情况下,UWA机制为每个用户学习一组波束特征和相应的权重。这种机制允许系统独立地关注不同的用户,并相应地调整波束形成过程。此外,它还允许网络动态地关注来自输入通道和用户约束的相关信息。为此,使用DANN模型适应动态波束模式来学习用户位置,信道测量和波束形成权重。该方法学习映射输入参数,如用户位置、信道测量和相应的波束模式,以提取波束模式适应的相关特征。因此,UWA-DANN方法为用户提供了更高的数据速率、较低的复杂性和更好的链路稳定性。实验结果表明,本文提出的UWA-DANN模型在城市场景下的可达率和累计率方面都比现有方案具有鲁棒性。
{"title":"Deep Adaptive Learning-Based Beam Combining Framework for 5G Millimeter-Wave Massive 3D-MIMO Uplink Systems","authors":"K. Mahendran,&nbsp;H. Sudarsan,&nbsp;S. Rathika,&nbsp;B. Shankarlal","doi":"10.1002/ett.70030","DOIUrl":"https://doi.org/10.1002/ett.70030","url":null,"abstract":"<div>\u0000 \u0000 <p>In today's wireless communication systems, the integration of 5G millimeter-wave (mmWave) Massive Multiple Input–Multiple Output (M-MIMO) technology offers significant advancements and capabilities that address the growing demand for higher data rates, increased capacity, and improved user experiences. In three-dimensional (3D) environments, the design of beamforming for uplink multi-user M-MIMO relies on accurate uplink channel state information (CSI) at the transmitter/receiver. In fact, it is difficult for the Base Station (BS) and the User Equipment (UE) to obtain beam patterns due to computational complexity, multiple 3D beams, and regulating the weight of antenna elements, which leads to significantly low sum-rate. Hence, a robust, deep adaptive learning framework in the case of 3D beamforming is needed. This paper proposes a deep adaptive learning-based beam combining framework using User-Wise Attention-Assisted Deep Adaptive Neural Network (UWA-DANN) for mmWave-3DM-MIMO systems. In this, a UWA mechanism learns a set of beam features and corresponding weights for each user. This mechanism allows the system to focus on different users independently and adapt the beamforming process accordingly. Also, it allows the network to dynamically focus on relevant information from the input channels and user constraints. To this end, a dynamic beam pattern is adapted using the DANN model to learn user positions, channel measurements, and beamforming weights. This approach learns to map input parameters such as user positions, channel measurements, and corresponding beam patterns to extract relevant features for beam pattern adaptation. Thus, the UWA-DANN approach provides higher data rates, low complexity, and improved link stability for users. Experimental results show that the proposed UWA-DANN model obtains robust performance over existing schemes in terms of achievable rate and sum-rate under field trial sites in urban scenarios.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142762168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable Intelligent Surface-Aided MIMO Secure Communication System With Finite-Alphabet Inputs 具有有限字母输入的可重构智能表面辅助MIMO安全通信系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-29 DOI: 10.1002/ett.70029
Yingjie Wu, Shilian Wang, Junshan Luo, Weiyu Chen

Existing research in the field of reconfigurable intelligent surface (RIS)-aided physical layer security assumed Gaussian signal inputs, which is inapplicable to practical communication systems, where finite-alphabet inputs are used. This paper considers an RIS-aided secure multiple-input multiple-output wireless communication system with finite-alphabet inputs, where artificial noise (AN) is invoked at the transmitter to enhance the secure performance. In order to maximize the secrecy rate (SR), the data precoder, the AN precoder, and RIS's reflection coefficients are jointly optimized subject to the constraints of the maximum transmit power and the finite resolution of the phase shifts of RIS. Particularly, due to the finite-alphabet input, the exact expression of the SR involves multiple integrals and lacks a closed-form expression. To tackle this, a closed-form lower bound of the SR is derived as the objective function, which is theoretically proved to be equal to the SR in the high signal-to-noise ratio region. Numerical results show that the RIS can significantly improve the secure performance, and the maximum possible SR (due to the finite-alphabet inputs) can be achieved by increasing the number of the RIS's elements or by increasing the transmit power, which shows the performance advantage of the proposed optimization algorithm.

现有的可重构智能表面(RIS)辅助物理层安全领域的研究假设了高斯信号输入,这并不适用于实际通信系统中使用有限字母输入的情况。本文研究了一种具有有限字母输入的ris辅助安全多输入多输出无线通信系统,该系统在发射机处引入人工噪声(an)以提高安全性能。在最大发射功率和RIS相移分辨率有限的约束下,为了使RIS的保密率(SR)最大化,对数据预编码器、AN预编码器和RIS的反射系数进行了联合优化。特别是,由于有限字母输入,SR的精确表达式涉及多个积分,缺乏封闭形式的表达式。为了解决这个问题,推导了一个封闭形式的SR下界作为目标函数,从理论上证明了它等于高信噪比区域的SR。数值结果表明,RIS可以显著提高安全性能,并且通过增加RIS单元数或增加发射功率可以实现最大可能的SR(由于输入字母有限),这表明了所提优化算法的性能优势。
{"title":"Reconfigurable Intelligent Surface-Aided MIMO Secure Communication System With Finite-Alphabet Inputs","authors":"Yingjie Wu,&nbsp;Shilian Wang,&nbsp;Junshan Luo,&nbsp;Weiyu Chen","doi":"10.1002/ett.70029","DOIUrl":"https://doi.org/10.1002/ett.70029","url":null,"abstract":"<div>\u0000 \u0000 <p>Existing research in the field of reconfigurable intelligent surface (RIS)-aided physical layer security assumed Gaussian signal inputs, which is inapplicable to practical communication systems, where finite-alphabet inputs are used. This paper considers an RIS-aided secure multiple-input multiple-output wireless communication system with finite-alphabet inputs, where artificial noise (AN) is invoked at the transmitter to enhance the secure performance. In order to maximize the secrecy rate (SR), the data precoder, the AN precoder, and RIS's reflection coefficients are jointly optimized subject to the constraints of the maximum transmit power and the finite resolution of the phase shifts of RIS. Particularly, due to the finite-alphabet input, the exact expression of the SR involves multiple integrals and lacks a closed-form expression. To tackle this, a closed-form lower bound of the SR is derived as the objective function, which is theoretically proved to be equal to the SR in the high signal-to-noise ratio region. Numerical results show that the RIS can significantly improve the secure performance, and the maximum possible SR (due to the finite-alphabet inputs) can be achieved by increasing the number of the RIS's elements or by increasing the transmit power, which shows the performance advantage of the proposed optimization algorithm.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142758078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Cloud Computing Paradigm: A Survey of Operational Concerns, Challenges and Open Issues 移动云计算范例:运营关注点、挑战和未决问题调查
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-27 DOI: 10.1002/ett.70020
Higinio Mora, Francisco A. Pujol, Tamai Ramirez-Gordillo, Antonio Jimeno

The Mobile Cloud Computing paradigm has revolutionized the concepts of mobile computing and the Internet of Things (IoT). This paradigm allows outsourcing the workload of mobile devices, or other connected “things,” to be computed in the Cloud. Currently, outsourcing possibilities have been widely developed making available computing platforms at different network layers. In a consequence of that, a virtual increasing of the performance and a homogenization of the computing capabilities of the devices are produced. The research described in this work presents a review of the state of the art about recent works, the main operational concerns, challenges, and open issues of this paradigm in order to update the border of knowledge on this topic. As a result, a critical analysis is conducted, and new research directions are discussed. The findings provide value-added to the scientific community and, therefore it could be helpful for other researches in these topics, especially given the rising popularity of IoT platforms.

移动云计算模式彻底改变了移动计算和物联网(IoT)的概念。这种模式允许将移动设备或其他联网 "物 "的工作负载外包给云计算。目前,外包的可能性已得到广泛开发,使不同网络层的计算平台成为可能。因此,设备性能的虚拟提升和计算能力的同质化也随之产生。本作品中描述的研究回顾了有关最新作品、主要操作问题、挑战和这一范例的开放性问题的技术现状,以更新有关这一主题的知识边界。因此,我们进行了批判性分析,并讨论了新的研究方向。研究结果为科学界提供了增值,因此对这些主题的其他研究也有帮助,特别是考虑到物联网平台的日益普及。
{"title":"Mobile Cloud Computing Paradigm: A Survey of Operational Concerns, Challenges and Open Issues","authors":"Higinio Mora,&nbsp;Francisco A. Pujol,&nbsp;Tamai Ramirez-Gordillo,&nbsp;Antonio Jimeno","doi":"10.1002/ett.70020","DOIUrl":"https://doi.org/10.1002/ett.70020","url":null,"abstract":"<p>The Mobile Cloud Computing paradigm has revolutionized the concepts of mobile computing and the Internet of Things (IoT). This paradigm allows outsourcing the workload of mobile devices, or other connected “things,” to be computed in the Cloud. Currently, outsourcing possibilities have been widely developed making available computing platforms at different network layers. In a consequence of that, a virtual increasing of the performance and a homogenization of the computing capabilities of the devices are produced. The research described in this work presents a review of the state of the art about recent works, the main operational concerns, challenges, and open issues of this paradigm in order to update the border of knowledge on this topic. As a result, a critical analysis is conducted, and new research directions are discussed. The findings provide value-added to the scientific community and, therefore it could be helpful for other researches in these topics, especially given the rising popularity of IoT platforms.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70020","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142737612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration of UAVs and FANETs in Disaster Management: A Review on Applications, Challenges and Future Directions 无人机与 FANET 在灾害管理中的整合:应用、挑战和未来方向综述
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-27 DOI: 10.1002/ett.70023
Sohail Abbas, Manar Abu Talib, Ibtihal Ahmed, Omar Belal

Rapid growth and technological improvement in wireless communication, driven by engineers from various disciplines, have reached significant milestones. Unmanned Aerial vehicles (UAVs) and flying ad hoc networks (FANET) have undergone one of the biggest innovations. UAVs have drawn a lot of attention from research institutions. They are increasingly employed in various application fields, such as real-time monitoring, precision farming, wireless coverage, military surveillance, climate monitoring, disaster surveillance, and monitoring and rescue operations. The primary characteristics of disasters are their unpredictability and the scarcity of resources in the affected areas. To reduce the loss of lives and livelihoods, disaster management has received much attention. Numerous methodologies and technologies have been developed to predict and handle disasters. UAVs are increasingly being used in disaster management. Additionally, artificial intelligence and collaborative machine learning techniques are gaining prominence among researchers, who are investigating the possibility of their use in disaster management tasks to better cope with the severe and frequently devastating effects of natural catastrophes. This paper provides a review of the relevant FANET research activities in disaster management and emerging artificial intelligence techniques, along with several observations and research challenges. The papers are categorized based on the disaster scenario-related problems and their proposed solutions. FANET problems are receiving less attention from the research community, and the main challenges with FANETs are also highlighted. Finally, significant insights are presented that can aid in improving research related to the application of FANETs in disaster management.

在各学科工程师的推动下,无线通信的快速发展和技术改进已经达到了重要的里程碑。无人驾驶飞行器(UAV)和飞行 ad hoc 网络(FANET)是其中最大的创新之一。无人飞行器引起了研究机构的广泛关注。它们被越来越多地应用于各个领域,如实时监控、精准农业、无线覆盖、军事监控、气候监测、灾害监控以及监测和救援行动等。灾害的主要特点是不可预测和灾区资源稀缺。为了减少生命和生计损失,灾害管理受到了广泛关注。目前已开发出许多方法和技术来预测和处理灾害。无人机正越来越多地用于灾害管理。此外,人工智能和协作式机器学习技术也越来越受到研究人员的重视,他们正在研究在灾害管理任务中使用这些技术的可能性,以更好地应对自然灾害经常造成的严重破坏性影响。本文回顾了 FANET 在灾害管理和新兴人工智能技术方面的相关研究活动,并提出了一些看法和研究挑战。本文根据与灾难场景相关的问题及其建议的解决方案对论文进行了分类。研究界对 FANET 问题的关注较少,FANET 面临的主要挑战也得到了强调。最后,论文提出了一些重要见解,有助于改进有关在灾害管理中应用 FANET 的研究。
{"title":"Integration of UAVs and FANETs in Disaster Management: A Review on Applications, Challenges and Future Directions","authors":"Sohail Abbas,&nbsp;Manar Abu Talib,&nbsp;Ibtihal Ahmed,&nbsp;Omar Belal","doi":"10.1002/ett.70023","DOIUrl":"https://doi.org/10.1002/ett.70023","url":null,"abstract":"<div>\u0000 \u0000 <p>Rapid growth and technological improvement in wireless communication, driven by engineers from various disciplines, have reached significant milestones. Unmanned Aerial vehicles (UAVs) and flying ad hoc networks (FANET) have undergone one of the biggest innovations. UAVs have drawn a lot of attention from research institutions. They are increasingly employed in various application fields, such as real-time monitoring, precision farming, wireless coverage, military surveillance, climate monitoring, disaster surveillance, and monitoring and rescue operations. The primary characteristics of disasters are their unpredictability and the scarcity of resources in the affected areas. To reduce the loss of lives and livelihoods, disaster management has received much attention. Numerous methodologies and technologies have been developed to predict and handle disasters. UAVs are increasingly being used in disaster management. Additionally, artificial intelligence and collaborative machine learning techniques are gaining prominence among researchers, who are investigating the possibility of their use in disaster management tasks to better cope with the severe and frequently devastating effects of natural catastrophes. This paper provides a review of the relevant FANET research activities in disaster management and emerging artificial intelligence techniques, along with several observations and research challenges. The papers are categorized based on the disaster scenario-related problems and their proposed solutions. FANET problems are receiving less attention from the research community, and the main challenges with FANETs are also highlighted. Finally, significant insights are presented that can aid in improving research related to the application of FANETs in disaster management.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142724208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRL-Based Computation-Efficient Offloading and Power Control for UAV-Assisted MEC Networks 基于 DRL 的计算高效卸载和功率控制,适用于无人机辅助的 MEC 网络
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-23 DOI: 10.1002/ett.70027
B. Priya, J. M. Nandhini, S. Uma, K. Anuratha

Mobile edge computing (MEC) has achieved significant attention due to the availability of computational tasks in specific scenarios such as emergency applications like forest fire and earthquake remedies. The computationally demanding policy and user offloading policy are challenging problems to address in the energy constrained unmanned aerial vehicle (UAV) network. In this work, the computational task offloading, and power management is solved by using the multi-agent deterministic power management algorithm (MADPM) based on deep reinforcement learning. Every UAV works together as a team to understand the actor critic environment and to make decisions that will help achieve the goals. This involves transferring computational tasks from UAVs to more powerful ground stations or other UAVs to save energy and enhance performance. It requires intelligent decision-making to determine which tasks to offload and when. The joint optimization problem is verified with the simulation results and the proposed work is enabled with MEC in achieving the emergence of UAV related applications. Our simulations show that the MADPM algorithm, as suggested, enhances task offloading efficiency by 35% and reduces power consumption by 25% when compared with current methods. These findings underscore the ability of our method to greatly improve the UAV operational capacities.

移动边缘计算(MEC)因其在特定场景(如森林火灾和地震救援等紧急应用)中的计算任务可用性而备受关注。在能源受限的无人机(UAV)网络中,计算需求策略和用户卸载策略是需要解决的具有挑战性的问题。在这项工作中,利用基于深度强化学习的多代理确定性功率管理算法(MADPM)解决了计算任务卸载和功率管理问题。每架无人机作为一个团队共同工作,以了解行动者的批评环境,并做出有助于实现目标的决策。这涉及将计算任务从无人机转移到更强大的地面站或其他无人机,以节省能源并提高性能。这需要智能决策来决定何时卸载哪些任务。联合优化问题通过仿真结果得到了验证,而提议的工作则通过 MEC 实现了无人机相关应用的出现。我们的仿真结果表明,与现有方法相比,所建议的 MADPM 算法可将任务卸载效率提高 35%,功耗降低 25%。这些发现强调了我们的方法能够极大地提高无人机的运行能力。
{"title":"DRL-Based Computation-Efficient Offloading and Power Control for UAV-Assisted MEC Networks","authors":"B. Priya,&nbsp;J. M. Nandhini,&nbsp;S. Uma,&nbsp;K. Anuratha","doi":"10.1002/ett.70027","DOIUrl":"https://doi.org/10.1002/ett.70027","url":null,"abstract":"<div>\u0000 \u0000 <p>Mobile edge computing (MEC) has achieved significant attention due to the availability of computational tasks in specific scenarios such as emergency applications like forest fire and earthquake remedies. The computationally demanding policy and user offloading policy are challenging problems to address in the energy constrained unmanned aerial vehicle (UAV) network. In this work, the computational task offloading, and power management is solved by using the multi-agent deterministic power management algorithm (MADPM) based on deep reinforcement learning. Every UAV works together as a team to understand the actor critic environment and to make decisions that will help achieve the goals. This involves transferring computational tasks from UAVs to more powerful ground stations or other UAVs to save energy and enhance performance. It requires intelligent decision-making to determine which tasks to offload and when. The joint optimization problem is verified with the simulation results and the proposed work is enabled with MEC in achieving the emergence of UAV related applications. Our simulations show that the MADPM algorithm, as suggested, enhances task offloading efficiency by 35% and reduces power consumption by 25% when compared with current methods. These findings underscore the ability of our method to greatly improve the UAV operational capacities.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142708224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Soft Actor-Critic Request Redirection for Quality Control in Green Multimedia Content Distribution 用于绿色多媒体内容分发质量控制的软代理-批评请求重定向
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-20 DOI: 10.1002/ett.70014
Pejman Goudarzi, Jaime Lloret

Nowadays, network resource limitations which are resulted from the increasing interest of greedy users for streaming video services, lead the network operators to use multimedia content distribution/delivery network (CDN) for distribution of user requests to the network edges and hence optimally use their resources. Due to the stochastic and uncertain nature of user request distributions and green energy suppliers (wind, solar, etc.), developing an optimal request redirection methodology that takes into account both maximizing total users' quality of experience (QoE) and energy cost minimization is a challenging issue. In this paper, a model-free soft actor-critic reinforcement learning algorithm has been developed for QoE enhancement of smart grid-enabled (green) content distribution networks. Contrary to the traditional CDNs, the achieved optimal request redirection policy, while maximizing the total QoE of the system, may redirect the users of a regional CDN point of presence to other (non-regional) PoPs due to real-time energy management mechanism associated with energy cost optimization constraints. We have performed extensive simulations on real electricity pricing data for validating the effectiveness of the proposed method and have compared it with similar approaches. The experimental results show that the proposed intelligent request routing method while preserving the same order of computational complexity, can achieve the energy cost savings up to 65% and improve the average total QoE of CDN users in comparison with similar methods.

如今,由于贪婪的用户对流媒体视频服务的兴趣与日俱增,导致网络资源有限,网络运营商不得不使用多媒体内容分发/交付网络(CDN)将用户请求分发到网络边缘,从而优化资源利用。由于用户请求分布和绿色能源供应商(风能、太阳能等)的随机性和不确定性,开发一种既能最大限度提高用户体验质量(QoE)又能最小化能源成本的最佳请求重定向方法是一个具有挑战性的问题。本文为智能电网(绿色)内容分发网络的 QoE 增强开发了一种无模型软行为批判强化学习算法。与传统的 CDN 不同,在最大化系统总 QoE 的同时,由于与能源成本优化约束相关的实时能源管理机制,所实现的最优请求重定向策略可能会将区域 CDN 存在点的用户重定向到其他(非区域)PoP。我们对真实电价数据进行了大量模拟,以验证所提方法的有效性,并将其与类似方法进行了比较。实验结果表明,与同类方法相比,所提出的智能请求路由方法在保持相同计算复杂度的前提下,可实现高达 65% 的能源成本节约,并改善 CDN 用户的平均总 QoE。
{"title":"Soft Actor-Critic Request Redirection for Quality Control in Green Multimedia Content Distribution","authors":"Pejman Goudarzi,&nbsp;Jaime Lloret","doi":"10.1002/ett.70014","DOIUrl":"https://doi.org/10.1002/ett.70014","url":null,"abstract":"<p>Nowadays, network resource limitations which are resulted from the increasing interest of greedy users for streaming video services, lead the network operators to use multimedia content distribution/delivery network (CDN) for distribution of user requests to the network edges and hence optimally use their resources. Due to the stochastic and uncertain nature of user request distributions and green energy suppliers (wind, solar, etc.), developing an optimal request redirection methodology that takes into account both maximizing total users' quality of experience (QoE) and energy cost minimization is a challenging issue. In this paper, a model-free soft actor-critic reinforcement learning algorithm has been developed for QoE enhancement of smart grid-enabled (green) content distribution networks. Contrary to the traditional CDNs, the achieved optimal request redirection policy, while maximizing the total QoE of the system, may redirect the users of a regional CDN point of presence to other (non-regional) PoPs due to real-time energy management mechanism associated with energy cost optimization constraints. We have performed extensive simulations on real electricity pricing data for validating the effectiveness of the proposed method and have compared it with similar approaches. The experimental results show that the proposed intelligent request routing method while preserving the same order of computational complexity, can achieve the energy cost savings up to 65% and improve the average total QoE of CDN users in comparison with similar methods.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70014","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142692085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secrecy Performance of Full-Duplex Space-Air-Ground Integrated Networks in the Presence of Active/Passive Eavesdropper, and Friendly Jammer 存在主动/被动窃听器和友好干扰器时的全双工空地一体化网络的保密性能
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-20 DOI: 10.1002/ett.70024
Ayse Betul Buyuksar, Eylem Erdogan, Ibrahim Altunbas

In this paper, a full-duplex (FD) space-air ground integrated network (SAGIN) system with passive and active eavesdroppers (PE/AE) and a friendly jammer (FJ) is investigated. The shadowing side information (SSI)-based unmanned aerial vehicle relay node (URN) selection strategy is considered to improve signal-to-interference plus noise power ratio (SINR) at the ground destination unit. To quantify the secrecy performance of the considered scenario, outage probability (OP), interception probability (IP), and transmission secrecy outage probability (TSOP) are investigated in the presence of FJ and PE/AE. The results have shown that aerial AE is an important threat since it can severely degrade the OP of the main transmission link. Furthermore, the FJ can decrease the IP of the eavesdropper by causing interference with the cost of power consumption of URNs. Simulations are performed to verify the theoretical findings.

本文研究了带有被动和主动窃听器(PE/AE)以及友方干扰器(FJ)的全双工(FD)空-空-地一体化网络(SAGIN)系统。研究考虑了基于阴影侧信息(SSI)的无人机中继节点(URN)选择策略,以提高地面目的地单元的信号干扰加噪声功率比(SINR)。为了量化所考虑方案的保密性能,研究了 FJ 和 PE/AE 存在时的中断概率 (OP)、截获概率 (IP) 和传输保密中断概率 (TSOP)。结果表明,空中 AE 是一个重要威胁,因为它会严重降低主传输链路的 OP。此外,FJ 还会以 URN 的功耗为代价造成干扰,从而降低窃听者的 IP。为验证理论结论,我们进行了仿真。
{"title":"Secrecy Performance of Full-Duplex Space-Air-Ground Integrated Networks in the Presence of Active/Passive Eavesdropper, and Friendly Jammer","authors":"Ayse Betul Buyuksar,&nbsp;Eylem Erdogan,&nbsp;Ibrahim Altunbas","doi":"10.1002/ett.70024","DOIUrl":"https://doi.org/10.1002/ett.70024","url":null,"abstract":"<div>\u0000 \u0000 <p>In this paper, a full-duplex (FD) space-air ground integrated network (SAGIN) system with passive and active eavesdroppers (PE/AE) and a friendly jammer (FJ) is investigated. The shadowing side information (SSI)-based unmanned aerial vehicle relay node (URN) selection strategy is considered to improve signal-to-interference plus noise power ratio (SINR) at the ground destination unit. To quantify the secrecy performance of the considered scenario, outage probability (OP), interception probability (IP), and transmission secrecy outage probability (TSOP) are investigated in the presence of FJ and PE/AE. The results have shown that aerial AE is an important threat since it can severely degrade the OP of the main transmission link. Furthermore, the FJ can decrease the IP of the eavesdropper by causing interference with the cost of power consumption of URNs. Simulations are performed to verify the theoretical findings.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142685242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An IoT-Based 5G Wireless Sensor Network Employs a Secure Routing Methodology Leveraging DCNN Processing 基于物联网的 5G 无线传感器网络采用利用 DCNN 处理的安全路由方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-19 DOI: 10.1002/ett.70025
Yassine Sabri, Adil Hilmani

The security principles of the fifth generation (5G) are anticipated to include robust cryptography models, information security models, and machine learning (ML) powered Intrusion Detection Systems (IDS) specifically designed for Internet of Things (IoT) based wireless sensor networks (WSNs). Nevertheless, the existing security models fall short in addressing the dynamic network characteristics of WSNs. In this context, the suggested system introduces a secure and collaborative multi-watchdog system through the implementation of deep convolutional neural network (DCNN) and distributed particle filtering evaluation scheme (DPFES). The proposed system utilizes deep learning (DL) techniques to create a dynamic multi-watchdog system that safeguards each sensor node by monitoring its transmissions. Furthermore, the proposed approach includes secure data-centric and node-centric evaluation methods that are crucial for enhancing the security of 5G-based IoT-WSN networks. The network evaluation processes based on DL facilitate the creation of a secure multi-watchdog system within dense IoT-WSN environments. This system enables the deployment of active watchdog IDS agents as needed. The proposed approach includes various components such as a system dynamics model, cooperative watchdog model, Dual Line Minimum Connected Dominating Set (DL-MCDS), and DL-based event analysis procedures. From a technical perspective, the system is driven by the implementation of DPFES, which utilizes particle filtering frameworks to analyze network events and establish a secure 5G environment. The system has been successfully implemented, and its results have been compared with those of other similar works. The performance of the proposed cooperative multi-watchdog system demonstrates a significant improvement of and compared to other techniques.

第五代(5G)的安全原则预计将包括强大的密码学模型、信息安全模型和机器学习(ML)驱动的入侵检测系统(IDS),这些都是专为基于物联网(IoT)的无线传感器网络(WSN)而设计的。然而,现有的安全模型在解决 WSN 的动态网络特性方面存在不足。在此背景下,建议的系统通过实施深度卷积神经网络(DCNN)和分布式粒子过滤评估方案(DPFES),引入了一个安全的协作式多看门狗系统。该系统利用深度学习(DL)技术创建了一个动态多看门狗系统,通过监控每个传感器节点的传输来保护其安全。此外,所提出的方法还包括以数据为中心的安全评估方法和以节点为中心的评估方法,这对于增强基于 5G 的物联网-WSN 网络的安全性至关重要。基于 DL 的网络评估流程有助于在密集的物联网-WSN 环境中创建安全的多看门狗系统。该系统可根据需要部署主动看门狗 IDS 代理。所提出的方法包括各种组件,如系统动力学模型、合作看门狗模型、双线最小连接占优集(DL-MCDS)和基于 DL 的事件分析程序。从技术角度看,该系统由 DPFES 的实施驱动,它利用粒子过滤框架分析网络事件并建立安全的 5G 环境。该系统已成功实施,其结果已与其他类似作品进行了比较。与其他技术相比,拟议的多看门狗合作系统的性能有了显著提高。
{"title":"An IoT-Based 5G Wireless Sensor Network Employs a Secure Routing Methodology Leveraging DCNN Processing","authors":"Yassine Sabri,&nbsp;Adil Hilmani","doi":"10.1002/ett.70025","DOIUrl":"https://doi.org/10.1002/ett.70025","url":null,"abstract":"<div>\u0000 \u0000 <p>The security principles of the fifth generation (5G) are anticipated to include robust cryptography models, information security models, and machine learning (ML) powered Intrusion Detection Systems (IDS) specifically designed for Internet of Things (IoT) based wireless sensor networks (WSNs). Nevertheless, the existing security models fall short in addressing the dynamic network characteristics of WSNs. In this context, the suggested system introduces a secure and collaborative multi-watchdog system through the implementation of deep convolutional neural network (DCNN) and distributed particle filtering evaluation scheme (DPFES). The proposed system utilizes deep learning (DL) techniques to create a dynamic multi-watchdog system that safeguards each sensor node by monitoring its transmissions. Furthermore, the proposed approach includes secure data-centric and node-centric evaluation methods that are crucial for enhancing the security of 5G-based IoT-WSN networks. The network evaluation processes based on DL facilitate the creation of a secure multi-watchdog system within dense IoT-WSN environments. This system enables the deployment of active watchdog IDS agents as needed. The proposed approach includes various components such as a system dynamics model, cooperative watchdog model, Dual Line Minimum Connected Dominating Set (DL-MCDS), and DL-based event analysis procedures. From a technical perspective, the system is driven by the implementation of DPFES, which utilizes particle filtering frameworks to analyze network events and establish a secure 5G environment. The system has been successfully implemented, and its results have been compared with those of other similar works. The performance of the proposed cooperative multi-watchdog system demonstrates a significant improvement of <span></span><math></math> and <span></span><math></math> compared to other techniques.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 12","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142679914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and Implementation of a Classification Method of Industrial Big Data for Security Management 面向安全管理的工业大数据分类方法研究与实施
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-14 DOI: 10.1002/ett.70021
Haibo Huang, Min Yan, Qiang Yan, Xiaofan Zhang

Purpose/Significance

With the extensive adoption of cloud computing, big data, artificial intelligence, the Internet of Things, and other novel information technologies in the industrial field, the data flow in industrial companies is rapidly increasing, leading to an explosion in the total volume of data. Ensuring effective data security has become a critical concern for both national and industrial entities.

Method/Process

To tackle the challenges of classification management of industrial big data, this study proposed an Information Security Triad Assessment-Support Vector Machine (AIC-ASVM) model according to information security principles. Building on national policy requirements, FIPS 199 standards, and the ABC grading method, a comprehensive classification framework for industrial data, termed “two-layer classification, three-dimensional grading,” was developed. By integrating the concept of Data Protection Impact Assessment (DPIA) from the GDPR, the classification of large industrial data sets was accomplished using a Support Vector Machine (SVM) algorithm.

Result/Conclusion

Simulations conducted using MATLAB yielded a classification accuracy of 96.67%. Furthermore, comparisons with decision tree and random forest models demonstrated that AIC-ASVM outperforms these alternatives, significantly improving the efficiency of big data classification and the quality of security management.

目的/意义 随着云计算、大数据、人工智能、物联网等新型信息技术在工业领域的广泛应用,工业企业的数据流量迅速增加,导致数据总量激增。确保有效的数据安全已成为国家和工业实体的关键问题。 方法/过程 为应对工业大数据分类管理的挑战,本研究根据信息安全原则提出了信息安全三元评估-支持向量机(AIC-ASVM)模型。在国家政策要求、FIPS 199 标准和 ABC 分级法的基础上,提出了 "双层分类、立体分级 "的工业数据综合分类框架。通过整合 GDPR 中的数据保护影响评估(DPIA)概念,使用支持向量机(SVM)算法完成了大型工业数据集的分类。 结果/结论 使用 MATLAB 进行模拟,分类准确率达到 96.67%。此外,与决策树和随机森林模型的比较表明,AIC-ASVM 的性能优于这些替代方法,从而显著提高了大数据分类的效率和安全管理的质量。
{"title":"Research and Implementation of a Classification Method of Industrial Big Data for Security Management","authors":"Haibo Huang,&nbsp;Min Yan,&nbsp;Qiang Yan,&nbsp;Xiaofan Zhang","doi":"10.1002/ett.70021","DOIUrl":"https://doi.org/10.1002/ett.70021","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Purpose/Significance</h3>\u0000 \u0000 <p>With the extensive adoption of cloud computing, big data, artificial intelligence, the Internet of Things, and other novel information technologies in the industrial field, the data flow in industrial companies is rapidly increasing, leading to an explosion in the total volume of data. Ensuring effective data security has become a critical concern for both national and industrial entities.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Method/Process</h3>\u0000 \u0000 <p>To tackle the challenges of classification management of industrial big data, this study proposed an Information Security Triad Assessment-Support Vector Machine (AIC-ASVM) model according to information security principles. Building on national policy requirements, FIPS 199 standards, and the ABC grading method, a comprehensive classification framework for industrial data, termed “two-layer classification, three-dimensional grading,” was developed. By integrating the concept of Data Protection Impact Assessment (DPIA) from the GDPR, the classification of large industrial data sets was accomplished using a Support Vector Machine (SVM) algorithm.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Result/Conclusion</h3>\u0000 \u0000 <p>Simulations conducted using MATLAB yielded a classification accuracy of 96.67%. Furthermore, comparisons with decision tree and random forest models demonstrated that AIC-ASVM outperforms these alternatives, significantly improving the efficiency of big data classification and the quality of security management.</p>\u0000 </section>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142642069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving Target Detection in Clutter Environment Based on Track Posture Hypothesis Testing 基于轨迹姿态假设检验的杂波环境中的移动目标检测
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-13 DOI: 10.1002/ett.70028
Lixiang Geng, Qinglin Zheng, Chengbao Zhang, Jiao Hou

Moving target detection in a heavy clutter area is a challenging problem in the field of radar automatic target detection. Within the framework of track posture hypothesis testing, the radar-blips-oriented target detection algorithms named ErgSad and RanSaD are proposed for single target and formation targets detection, respectively in this paper. With the assumption that target motion is a linear Gaussian process in a short time, the algorithms use dual blips in different scans to generate the track hypothesis and test the hypothesis with residual blips in other scans to determine the existence of moving targets. To reduce time consumption and minimize the error of model estimation, the sampling rules and the supporting domain related to timestamps of track hypothesis models were designed. Simulation data experiments show that the proposed algorithms have more superior performance to detect targets than the state-of-the-art algorithms in the serious clutter environment.

重杂波区域的移动目标检测是雷达自动目标检测领域的一个难题。本文在轨迹态势假设检验的框架下,提出了面向雷达弹幕的目标检测算法 ErgSad 和 RanSaD,分别用于单目标和编队目标的检测。在假定目标运动是短时间内的线性高斯过程的前提下,算法利用不同扫描中的双闪点生成轨迹假说,并利用其他扫描中的残余闪点检验假说,以确定运动目标的存在。为减少时间消耗和最小化模型估计误差,设计了与轨迹假设模型时间戳相关的采样规则和支持域。仿真数据实验表明,与最先进的算法相比,所提出的算法在严重杂波环境下检测目标的性能更加优越。
{"title":"Moving Target Detection in Clutter Environment Based on Track Posture Hypothesis Testing","authors":"Lixiang Geng,&nbsp;Qinglin Zheng,&nbsp;Chengbao Zhang,&nbsp;Jiao Hou","doi":"10.1002/ett.70028","DOIUrl":"https://doi.org/10.1002/ett.70028","url":null,"abstract":"<div>\u0000 \u0000 <p>Moving target detection in a heavy clutter area is a challenging problem in the field of radar automatic target detection. Within the framework of track posture hypothesis testing, the radar-blips-oriented target detection algorithms named ErgSad and RanSaD are proposed for single target and formation targets detection, respectively in this paper. With the assumption that target motion is a linear Gaussian process in a short time, the algorithms use dual blips in different scans to generate the track hypothesis and test the hypothesis with residual blips in other scans to determine the existence of moving targets. To reduce time consumption and minimize the error of model estimation, the sampling rules and the supporting domain related to timestamps of track hypothesis models were designed. Simulation data experiments show that the proposed algorithms have more superior performance to detect targets than the state-of-the-art algorithms in the serious clutter environment.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142642269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1