首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
Robust joint multiple resources allocation algorithm for cooperative underwater acoustic communication networks 合作式水下声学通信网络的鲁棒联合多资源分配算法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-29 DOI: 10.1002/ett.5038
Song Han, Aijia Li, Xiaotong Jiang, Xinbin Li, Zhixin Liu, Lei Yan, Tongwei Zhang

In this article, a joint relay selection, power control and time allocation problem is studied to maximize the energy efficiency for the cooperative underwater acoustic communication networks. The joint optimization problem is full of challenges due to the strong coupling of multiple resources and the uncertain characteristics of the underwater acoustic communication scenario. To address this issue, the worst-case method is employed to transform an original uncertain problem into a deterministic problem. Furthermore, we propose the block coordinate descent-based method to decouple the strongly coupling multi-resource allocation problem into three relatively independent sub-problems. The coupling of multiple resources is completely decoupled, thereby greatly reducing the solving difficulty. In addition, given that the sub-problems with the fractional objective function are still non-convex and hard to solve, the Dinkelbach-based method is proposed to transform the fractional objective function into a subtractive form. At last, the relay selection sub-problem is transformed into a integer programming problem, and the time allocation sub-problem is transformed into a linear programming problem, whose optimal solutions can be obtained by some well-established solution methods. The power allocation problem is transformed into a convex optimization problem, which can be solved by the Lagrangian dual method. Finally, in the proposed iteration structure, the three sub-problems are alternatingly solved until convergence. Simulation results are presented to demonstrate the efficiency and robustness of the proposed algorithm.

本文研究了一个联合中继选择、功率控制和时间分配问题,以最大化合作水下声学通信网络的能量效率。由于多种资源的强耦合性和水下声学通信场景的不确定性特征,联合优化问题充满挑战。针对这一问题,我们采用了最坏情况法,将原来的不确定问题转化为确定性问题。此外,我们还提出了基于块坐标下降的方法,将强耦合的多资源分配问题解耦为三个相对独立的子问题。多个资源的耦合被完全解耦,从而大大降低了求解难度。此外,考虑到分数目标函数的子问题仍然是非凸求解,因此提出了基于 Dinkelbach 的方法,将分数目标函数转化为减函数形式。最后,将中继选择子问题转化为整数编程问题,将时间分配子问题转化为线性编程问题,通过一些成熟的求解方法可以得到其最优解。功率分配问题被转化为一个凸优化问题,可用拉格朗日对偶法求解。最后,在所提出的迭代结构中,三个子问题交替求解,直至收敛。仿真结果表明了所提算法的效率和鲁棒性。
{"title":"Robust joint multiple resources allocation algorithm for cooperative underwater acoustic communication networks","authors":"Song Han,&nbsp;Aijia Li,&nbsp;Xiaotong Jiang,&nbsp;Xinbin Li,&nbsp;Zhixin Liu,&nbsp;Lei Yan,&nbsp;Tongwei Zhang","doi":"10.1002/ett.5038","DOIUrl":"https://doi.org/10.1002/ett.5038","url":null,"abstract":"<p>In this article, a joint relay selection, power control and time allocation problem is studied to maximize the energy efficiency for the cooperative underwater acoustic communication networks. The joint optimization problem is full of challenges due to the strong coupling of multiple resources and the uncertain characteristics of the underwater acoustic communication scenario. To address this issue, the worst-case method is employed to transform an original uncertain problem into a deterministic problem. Furthermore, we propose the block coordinate descent-based method to decouple the strongly coupling multi-resource allocation problem into three relatively independent sub-problems. The coupling of multiple resources is completely decoupled, thereby greatly reducing the solving difficulty. In addition, given that the sub-problems with the fractional objective function are still non-convex and hard to solve, the Dinkelbach-based method is proposed to transform the fractional objective function into a subtractive form. At last, the relay selection sub-problem is transformed into a integer programming problem, and the time allocation sub-problem is transformed into a linear programming problem, whose optimal solutions can be obtained by some well-established solution methods. The power allocation problem is transformed into a convex optimization problem, which can be solved by the Lagrangian dual method. Finally, in the proposed iteration structure, the three sub-problems are alternatingly solved until convergence. Simulation results are presented to demonstrate the efficiency and robustness of the proposed algorithm.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning solutions for mobile internet of things security: A literature review and research agenda 移动物联网安全的机器学习解决方案:文献综述与研究议程
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-25 DOI: 10.1002/ett.5041
Hadjer Messabih, Chaker Abdelaziz Kerrache, Youssra Cheriguene, Marica Amadeo, Farhan Ahmad

In recent years, the advancements in wireless technologies and sensor networks have promoted the Mobile Internet of Things (MIoT) paradigm. However, the unique characteristics of MIoT networks expose them to significant security vulnerabilities and threats, necessitating robust cybersecurity measures, including effective attack detection and mitigation techniques. Among these strategies, Artificial Intelligence (AI), and particularly Machine Learning- (ML) based approaches, emerge as a pivotal method for bolstering MIoT security. In this paper, we present a comprehensive literature survey regarding the utilization of ML for enhancing security in MIoT. Through an exhaustive review of existing research articles, we analyze the diverse array of ML-based approaches employed to safeguard MIoT ecosystems and provide a holistic understanding of the current landscape, elucidating the strengths and limitations of prevailing methodologies. We propose a structured taxonomy to categorize recent works in this domain, by distinguishing approaches based on Shallow Supervised Learning (SSL), Shallow Unsupervised Learning (SUL), Deep Learning (DL), and Reinforcement Learning (RL). By delineating existing challenges and potential future directions for cybersecurity in MIoT, we aim to stimulate discourse and inspire novel approaches towards more resilient and secure MIoT ecosystems.

近年来,无线技术和传感器网络的进步推动了移动物联网(MIoT)模式的发展。然而,MIoT 网络的独特性使其面临着巨大的安全漏洞和威胁,因此有必要采取强有力的网络安全措施,包括有效的攻击检测和缓解技术。在这些策略中,人工智能(AI),特别是基于机器学习(ML)的方法,成为加强 MIoT 安全的关键方法。在本文中,我们将对有关利用 ML 增强 MIoT 安全性的文献进行全面调查。通过对现有研究文章的详尽评述,我们分析了为保护 MIoT 生态系统而采用的各种基于 ML 的方法,并提供了对当前格局的整体理解,阐明了现有方法的优势和局限性。我们提出了一种结构化分类法,通过区分基于浅层监督学习(SSL)、浅层无监督学习(SUL)、深度学习(DL)和强化学习(RL)的方法,对该领域的最新研究成果进行分类。通过划分 MIoT 网络安全的现有挑战和潜在未来方向,我们旨在激发讨论,启发新方法,以实现更具弹性和更安全的 MIoT 生态系统。
{"title":"Machine learning solutions for mobile internet of things security: A literature review and research agenda","authors":"Hadjer Messabih,&nbsp;Chaker Abdelaziz Kerrache,&nbsp;Youssra Cheriguene,&nbsp;Marica Amadeo,&nbsp;Farhan Ahmad","doi":"10.1002/ett.5041","DOIUrl":"https://doi.org/10.1002/ett.5041","url":null,"abstract":"<p>In recent years, the advancements in wireless technologies and sensor networks have promoted the Mobile Internet of Things (MIoT) paradigm. However, the unique characteristics of MIoT networks expose them to significant security vulnerabilities and threats, necessitating robust cybersecurity measures, including effective attack detection and mitigation techniques. Among these strategies, Artificial Intelligence (AI), and particularly Machine Learning- (ML) based approaches, emerge as a pivotal method for bolstering MIoT security. In this paper, we present a comprehensive literature survey regarding the utilization of ML for enhancing security in MIoT. Through an exhaustive review of existing research articles, we analyze the diverse array of ML-based approaches employed to safeguard MIoT ecosystems and provide a holistic understanding of the current landscape, elucidating the strengths and limitations of prevailing methodologies. We propose a structured taxonomy to categorize recent works in this domain, by distinguishing approaches based on Shallow Supervised Learning (SSL), Shallow Unsupervised Learning (SUL), Deep Learning (DL), and Reinforcement Learning (RL). By delineating existing challenges and potential future directions for cybersecurity in MIoT, we aim to stimulate discourse and inspire novel approaches towards more resilient and secure MIoT ecosystems.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142320612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LBCSC: Lattice-based chameleon signcryption scheme for secure and privacy-preserving vehicular communications LBCSC:用于安全和保护隐私的车辆通信的基于格子的变色龙签名加密方案
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-19 DOI: 10.1002/ett.5040
Jianhong Zhang, Xinyan Cui

Guaranteeing the anonymity of the vehicle and the integrity of the transmitted message are two indispensable conditions in vehicular ad-hoc network. Anonymous signature can achieve the two function. However, existing anonymous signature schemes constructed based on traditional cryptosystems cannot withstand quantum attacks. In addition, in some cases, the schemes need to satisfy the non-transferability of signatures to solve the problem of signature misuse due to publicly verified signatures. In order to resist quantum attacks and address the problem of signature misuse, this article proposes a lattice-based chameleon signcryption scheme, which aims to protect vehicle identity and data security. The scheme is resistant to quantum attacks and satisfies signature non-transferability, signer rejectability and non-repudiation. Especially, we prove that the proposed scheme is secure in the Standard Model based on the error learning problem and the classical lattice small integer solution problem.

保证车辆的匿名性和传输信息的完整性是车载 ad-hoc 网络不可或缺的两个条件。匿名签名可以实现这两个功能。然而,基于传统密码系统构建的现有匿名签名方案无法抵御量子攻击。此外,在某些情况下,这些方案还需要满足签名的不可转移性,以解决公开验证签名导致的签名滥用问题。为了抵御量子攻击并解决签名滥用问题,本文提出了一种基于网格的变色龙签名加密方案,旨在保护车辆身份和数据安全。该方案可抵御量子攻击,并满足签名不可转移性、签名者可拒绝性和不可抵赖性。特别是,我们基于误差学习问题和经典晶格小整数解问题证明了所提出的方案在标准模型中是安全的。
{"title":"LBCSC: Lattice-based chameleon signcryption scheme for secure and privacy-preserving vehicular communications","authors":"Jianhong Zhang,&nbsp;Xinyan Cui","doi":"10.1002/ett.5040","DOIUrl":"https://doi.org/10.1002/ett.5040","url":null,"abstract":"<p>Guaranteeing the anonymity of the vehicle and the integrity of the transmitted message are two indispensable conditions in vehicular ad-hoc network. Anonymous signature can achieve the two function. However, existing anonymous signature schemes constructed based on traditional cryptosystems cannot withstand quantum attacks. In addition, in some cases, the schemes need to satisfy the non-transferability of signatures to solve the problem of signature misuse due to publicly verified signatures. In order to resist quantum attacks and address the problem of signature misuse, this article proposes a lattice-based chameleon signcryption scheme, which aims to protect vehicle identity and data security. The scheme is resistant to quantum attacks and satisfies signature non-transferability, signer rejectability and non-repudiation. Especially, we prove that the proposed scheme is secure in the Standard Model based on the error learning problem and the classical lattice small integer solution problem.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142273097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delay sensitive and energy adaptive clustering hierarchy protocol using enhanced agglomerative hierarchy algorithm with time-controlled jellyfish optimization 使用时间控制水母优化增强聚类分层算法的延迟敏感和能量自适应聚类分层协议
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-17 DOI: 10.1002/ett.5039
Atul Kumar Agnihotri, Vishal Awasthi

Wireless sensor networks have sensing functions which made up of small sensor nodes that are processing and communication capabilities. However, the traditional approach of designating a single sensor node as the cluster head often leads to a faster depletion of its energy resources than another node. So, periodic reassignment of the cluster head role among different sensor nodes is crucial to extend operational lifetime and ensure sustained performance. Therefore, this research proposes an Enhanced Agglomerative Hierarchy Algorithm based on the Low Energy Adaptive Clustering Hierarchy (EAHALEACH) protocol, coupled with an enhanced time-controlled optimization algorithm, to enhance energy efficiency by selecting the optimal cluster head from a candidate pool. The proposed method enhances energy efficiency by optimally selecting cluster heads, which reduces energy consumption and extends the lifespan of the network. Additionally, a lightweight energy-aware cluster head rotation algorithm is introduced to efficiently rotate the cluster head role within the sensor node network, minimizing unnecessary data transmissions and extending the network lifetime. A hybrid approach combining Carrier Sense and Time Division Multiple Access (CSTDMA) optimizes packet forwarding by dynamically allocating time slots, reducing collisions and contention to improve packet forwarding efficiency. Comparative analysis with existing techniques demonstrates that the hybrid clustering-based LEACH protocol achieves superior performance in terms of throughput 4600 bps by 2000 rounds, energy consumption 50 J, latency as 1 ms and network lifetime in 1000th node attains 3500 s. These advancements contribute to prolonged operational efficiency and sustained performance in wireless sensor network deployments.

无线传感器网络具有传感功能,由具有处理和通信能力的小型传感器节点组成。然而,指定单个传感器节点作为簇头的传统方法往往会导致其能源耗尽速度快于其他节点。因此,在不同的传感器节点之间定期重新分配簇头角色对于延长运行寿命和确保持续性能至关重要。因此,本研究提出了一种基于低能耗自适应聚类层次结构(EAHALEACH)协议的增强聚类层次结构算法,并结合一种增强的时间控制优化算法,通过从候选池中选择最佳簇头来提高能效。所提出的方法通过优化选择簇头提高了能效,从而降低了能耗,延长了网络的寿命。此外,还引入了一种轻量级能量感知簇头轮换算法,在传感器节点网络内有效轮换簇头角色,最大限度地减少不必要的数据传输,延长网络寿命。载波感应和时分多址(CSTDMA)相结合的混合方法通过动态分配时隙、减少碰撞和争用来优化数据包转发,从而提高数据包转发效率。与现有技术的对比分析表明,基于混合聚类的 LEACH 协议在 2000 轮吞吐量 4600 bps、能耗 50 J、延迟 1 ms 以及第 1000 个节点的网络寿命达到 3500 s 等方面表现出色。这些进步有助于提高无线传感器网络部署的运行效率和持续性能。
{"title":"Delay sensitive and energy adaptive clustering hierarchy protocol using enhanced agglomerative hierarchy algorithm with time-controlled jellyfish optimization","authors":"Atul Kumar Agnihotri,&nbsp;Vishal Awasthi","doi":"10.1002/ett.5039","DOIUrl":"https://doi.org/10.1002/ett.5039","url":null,"abstract":"<p>Wireless sensor networks have sensing functions which made up of small sensor nodes that are processing and communication capabilities. However, the traditional approach of designating a single sensor node as the cluster head often leads to a faster depletion of its energy resources than another node. So, periodic reassignment of the cluster head role among different sensor nodes is crucial to extend operational lifetime and ensure sustained performance. Therefore, this research proposes an Enhanced Agglomerative Hierarchy Algorithm based on the Low Energy Adaptive Clustering Hierarchy (EAHALEACH) protocol, coupled with an enhanced time-controlled optimization algorithm, to enhance energy efficiency by selecting the optimal cluster head from a candidate pool. The proposed method enhances energy efficiency by optimally selecting cluster heads, which reduces energy consumption and extends the lifespan of the network. Additionally, a lightweight energy-aware cluster head rotation algorithm is introduced to efficiently rotate the cluster head role within the sensor node network, minimizing unnecessary data transmissions and extending the network lifetime. A hybrid approach combining Carrier Sense and Time Division Multiple Access (CSTDMA) optimizes packet forwarding by dynamically allocating time slots, reducing collisions and contention to improve packet forwarding efficiency. Comparative analysis with existing techniques demonstrates that the hybrid clustering-based LEACH protocol achieves superior performance in terms of throughput 4600 bps by 2000 rounds, energy consumption 50 J, latency as 1 ms and network lifetime in 1000th node attains 3500 s. These advancements contribute to prolonged operational efficiency and sustained performance in wireless sensor network deployments.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142244971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SKALP: Secure key agreement and lightweight protocol for dew-assisted IoT enabled edge computing SKALP:用于露水辅助物联网边缘计算的安全密钥协议和轻量级协议
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-10 DOI: 10.1002/ett.5035
Saeed Ullah Jan, Anwar Ghani, Abdulrahman Alzahrani, Muhammad Usman Tariq, Fahad Algarni, Husnain Abbas Naqvi

The Internet of Things (IoT) is a transformative technology that has found applications in diverse domains, including automation, logistics, grid, transportation, healthcare, and more. In these domains, IoT systems generate a significant amount of data, which can be stored in a cloud. However, cloud computing may not be practical in certain delay-sensitive IoT applications with complex operations. To address this, fog and edge computing paradigms have been introduced, but they rely on a reliable internet connection for proper functioning. The dew computing paradigm, a novel concept, allows the execution of various applications in the IoT environment, with or without internet connectivity. However, ensuring data confidentiality and integrity during transmission and storage in such an environment remains a significant challenge. Therefore, a fail-safe and highly effective security mechanism is yet to be proposed. This study introduces a protocol that utilizes the elliptic curve cryptography and secure hash algorithm to design a secure key agreement and lightweight protocol (SKALP). SKALP security is formally analyzed using BAN (Burrows-Abadi-Needham) logic, ROM (Random Oracle Model), RoR (Real-Or-Random) model, and ProVerif (Protocol Verifier) simulation while informally discussing it to evaluate its resistance against well-known attacks. Additionally, the performance analysis of SKALP considers the costs associated with communication and computation. The findings from the comparative analysis indicate that the SKALP demonstrates a higher level of superiority than its competitors.

物联网(IoT)是一项变革性技术,已被应用于自动化、物流、电网、交通、医疗保健等多个领域。在这些领域,物联网系统会产生大量数据,这些数据可以存储在云中。然而,在某些操作复杂、对延迟敏感的物联网应用中,云计算可能并不实用。为解决这一问题,人们引入了雾计算和边缘计算范例,但它们的正常运行依赖于可靠的互联网连接。露计算范例是一个新颖的概念,它允许在有或没有互联网连接的情况下,在物联网环境中执行各种应用。然而,在这样的环境中,如何确保数据在传输和存储过程中的保密性和完整性仍然是一个重大挑战。因此,一种万无一失且高效的安全机制仍有待提出。本研究介绍了一种利用椭圆曲线密码学和安全哈希算法来设计安全密钥协议和轻量级协议(SKALP)的协议。本研究利用 BAN(Burrows-Abadi-Needham)逻辑、ROM(Random Oracle Model)、RoR(Real-Or-Random)模型和 ProVerif(Protocol Verifier)模拟对 SKALP 的安全性进行了正式分析,同时对其进行了非正式讨论,以评估其对众所周知的攻击的抵抗能力。此外,SKALP 的性能分析还考虑了与通信和计算相关的成本。比较分析的结果表明,SKALP 比其竞争对手表现出更高的优越性。
{"title":"SKALP: Secure key agreement and lightweight protocol for dew-assisted IoT enabled edge computing","authors":"Saeed Ullah Jan,&nbsp;Anwar Ghani,&nbsp;Abdulrahman Alzahrani,&nbsp;Muhammad Usman Tariq,&nbsp;Fahad Algarni,&nbsp;Husnain Abbas Naqvi","doi":"10.1002/ett.5035","DOIUrl":"https://doi.org/10.1002/ett.5035","url":null,"abstract":"<p>The Internet of Things (IoT) is a transformative technology that has found applications in diverse domains, including automation, logistics, grid, transportation, healthcare, and more. In these domains, IoT systems generate a significant amount of data, which can be stored in a cloud. However, cloud computing may not be practical in certain delay-sensitive IoT applications with complex operations. To address this, fog and edge computing paradigms have been introduced, but they rely on a reliable internet connection for proper functioning. The dew computing paradigm, a novel concept, allows the execution of various applications in the IoT environment, with or without internet connectivity. However, ensuring data confidentiality and integrity during transmission and storage in such an environment remains a significant challenge. Therefore, a fail-safe and highly effective security mechanism is yet to be proposed. This study introduces a protocol that utilizes the elliptic curve cryptography and secure hash algorithm to design a secure key agreement and lightweight protocol (SKALP). SKALP security is formally analyzed using BAN (Burrows-Abadi-Needham) logic, ROM (Random Oracle Model), RoR (Real-Or-Random) model, and ProVerif (Protocol Verifier) simulation while informally discussing it to evaluate its resistance against well-known attacks. Additionally, the performance analysis of SKALP considers the costs associated with communication and computation. The findings from the comparative analysis indicate that the SKALP demonstrates a higher level of superiority than its competitors.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RF-GCN: Residual fused-graph convolutional network using multimodalities for facial emotion recognition RF-GCN:利用多模态的残差融合图卷积网络进行面部情绪识别
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-07 DOI: 10.1002/ett.5031
D. Vishnu Sakthi, P. Ezhumalai

Background

The emotional state of individuals is difficult to identify and it is developing now a days because of vast interest in recognition. Many technologies have been developed to identify this emotional expression based on facial expressions, vocal expressions, physiological signals, and body expressions. Among these, facial emotion is very expressive for recognition using multimodalities. Understanding facial emotions has applications in mental well-being, decision-making, and even social change, as emotions play a crucial role in our lives. This recognition is complicated by the high dimensionality of data and non-linear interactions across modalities. Moreover, the way emotion is expressed by people varies and these feature identification remains challenging, where these limitations are overcome by Deep learning models.

Methods

This research work aims at facial emotion recognition through the utilization of a deep learning model, named the proposed Residual Fused-Graph Convolution Network (RF-GCN). Here, multimodal data included is video as well as an Electroencephalogram (EEG) signal. Also, the Non-Local Means (NLM) filter is used for pre-processing input video frames. Here, the feature selection process is carried out using chi-square, after feature extraction, which is done in both pre-processed video frames and input EEG signals. Finally, facial emotion recognition and its types are determined by RF-GCN, which is a combination of both the Deep Residual Network (DRN) and Graph Convolutional Network (GCN).

Results

Further, RF-GCN is evaluated for performance by metrics such as accuracy, recall, and precision, with superior values of 91.6%, 96.5%, and 94.7%.

Conclusions

RF-GCN captures the nuanced relationships between different emotional states and improves recognition accuracy. The model is trained and evaluated on the dataset and reflects real-world conditions.

背景 个人的情绪状态很难识别,如今由于人们对识别的极大兴趣,这种技术正在不断发展。目前已开发出许多技术,可根据面部表情、声音表情、生理信号和肢体表情来识别这种情绪表达。其中,面部情绪对于使用多模态技术进行识别具有很强的表现力。由于情绪在我们的生活中起着至关重要的作用,因此了解面部情绪在心理健康、决策甚至社会变革方面都有应用。数据的高维度和跨模态的非线性交互使识别变得复杂。此外,人们表达情绪的方式各不相同,这些特征识别仍然具有挑战性,而深度学习模型可以克服这些限制。 方法 本研究工作旨在通过利用一种名为 "残差融合图卷积网络(RF-GCN)"的深度学习模型进行面部情绪识别。这里的多模态数据包括视频和脑电图(EEG)信号。此外,非局部均值(NLM)滤波器用于预处理输入视频帧。在这里,特征提取后的特征选择过程是在预处理过的视频帧和输入的脑电图信号中进行的。最后,面部情绪识别及其类型由 RF-GCN 确定,RF-GCN 是深度残差网络(DRN)和图卷积网络(GCN)的结合体。 结果 通过准确率、召回率和精确率等指标对 RF-GCN 的性能进行了进一步评估,结果显示 RF-GCN 的准确率、召回率和精确率分别达到 91.6%、96.5% 和 94.7%。 结论 RF-GCN 能够捕捉不同情绪状态之间的细微关系,提高识别准确率。该模型在数据集上进行了训练和评估,反映了真实世界的情况。
{"title":"RF-GCN: Residual fused-graph convolutional network using multimodalities for facial emotion recognition","authors":"D. Vishnu Sakthi,&nbsp;P. Ezhumalai","doi":"10.1002/ett.5031","DOIUrl":"https://doi.org/10.1002/ett.5031","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Background</h3>\u0000 \u0000 <p>The emotional state of individuals is difficult to identify and it is developing now a days because of vast interest in recognition. Many technologies have been developed to identify this emotional expression based on facial expressions, vocal expressions, physiological signals, and body expressions. Among these, facial emotion is very expressive for recognition using multimodalities. Understanding facial emotions has applications in mental well-being, decision-making, and even social change, as emotions play a crucial role in our lives. This recognition is complicated by the high dimensionality of data and non-linear interactions across modalities. Moreover, the way emotion is expressed by people varies and these feature identification remains challenging, where these limitations are overcome by Deep learning models.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Methods</h3>\u0000 \u0000 <p>This research work aims at facial emotion recognition through the utilization of a deep learning model, named the proposed Residual Fused-Graph Convolution Network (RF-GCN). Here, multimodal data included is video as well as an Electroencephalogram (EEG) signal. Also, the Non-Local Means (NLM) filter is used for pre-processing input video frames. Here, the feature selection process is carried out using chi-square, after feature extraction, which is done in both pre-processed video frames and input EEG signals. Finally, facial emotion recognition and its types are determined by RF-GCN, which is a combination of both the Deep Residual Network (DRN) and Graph Convolutional Network (GCN).</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Results</h3>\u0000 \u0000 <p>Further, RF-GCN is evaluated for performance by metrics such as accuracy, recall, and precision, with superior values of 91.6%, 96.5%, and 94.7%.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Conclusions</h3>\u0000 \u0000 <p>RF-GCN captures the nuanced relationships between different emotional states and improves recognition accuracy. The model is trained and evaluated on the dataset and reflects real-world conditions.</p>\u0000 </section>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142152180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable information delivery and dynamic link utilization in MANET cloud using deep reinforcement learning 利用深度强化学习实现城域网云中的可靠信息传递和动态链路利用
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-04 DOI: 10.1002/ett.5028
Shuhong Kuang, Jiyong Zhang, Amin Mohajer

Modern networking demands efficient and reliable information delivery within Mobile Ad-hoc Network (MANET) and cloud environments. This paper introduces a novel approach that employs Multi-Agent Deep Learning (MADL) for adaptive resource allocation, addressing the challenges of optimizing traffic and ensuring dependable information delivery while adhering to Service Level Agreement (SLA) constraints. Our method dynamically allocates resources across nodes, leveraging the synergy between Advanced Cloud Computing and Edge Computing to balance centralized processing and localized adaptability. The integration of Graph Neural Networks (GNNs) further enhances this process by adapting resource allocation decisions based on network topology. Through iterative learning, our algorithm fine-tunes continuous-time resource optimization policies, resulting in substantial improvements in throughput and latency minimization. Simulations validate the effectiveness of our approach, demonstrating its potential to contribute to the advancement of MANET cloud networks by offering adaptability, efficiency, and real-time optimization for reliable information delivery and dynamic link utilization.

现代网络要求在移动无线局域网(MANET)和云环境中实现高效可靠的信息传输。本文介绍了一种采用多代理深度学习(MADL)进行自适应资源分配的新方法,以应对优化流量和确保可靠信息传输的挑战,同时遵守服务级别协议(SLA)约束。我们的方法可跨节点动态分配资源,利用先进云计算和边缘计算之间的协同作用,在集中处理和本地化适应性之间实现平衡。图神经网络(GNN)的集成可根据网络拓扑调整资源分配决策,从而进一步增强这一过程。通过迭代学习,我们的算法对连续时间资源优化策略进行了微调,从而大幅提高了吞吐量和延迟最小化。仿真验证了我们的方法的有效性,证明了它通过为可靠的信息传输和动态链路利用提供适应性、效率和实时优化,为推进城域网云网络的发展做出贡献的潜力。
{"title":"Reliable information delivery and dynamic link utilization in MANET cloud using deep reinforcement learning","authors":"Shuhong Kuang,&nbsp;Jiyong Zhang,&nbsp;Amin Mohajer","doi":"10.1002/ett.5028","DOIUrl":"https://doi.org/10.1002/ett.5028","url":null,"abstract":"<p>Modern networking demands efficient and reliable information delivery within Mobile Ad-hoc Network (MANET) and cloud environments. This paper introduces a novel approach that employs Multi-Agent Deep Learning (MADL) for adaptive resource allocation, addressing the challenges of optimizing traffic and ensuring dependable information delivery while adhering to Service Level Agreement (SLA) constraints. Our method dynamically allocates resources across nodes, leveraging the synergy between Advanced Cloud Computing and Edge Computing to balance centralized processing and localized adaptability. The integration of Graph Neural Networks (GNNs) further enhances this process by adapting resource allocation decisions based on network topology. Through iterative learning, our algorithm fine-tunes continuous-time resource optimization policies, resulting in substantial improvements in throughput and latency minimization. Simulations validate the effectiveness of our approach, demonstrating its potential to contribute to the advancement of MANET cloud networks by offering adaptability, efficiency, and real-time optimization for reliable information delivery and dynamic link utilization.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142137706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A semantic axiomatic design for integrity in IoT 物联网完整性的语义公理设计
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-27 DOI: 10.1002/ett.5032
Maryam Nooraei Abadeh

In the complex, critical, and rapidly evolving era of Industry 4.0 manufacturing, mature engineering disciplines can be developed to validate system designs at an abstract level, enabling effective fault-free environments. However, designing integrated IoT platforms presents significant challenges due to their inherent complexity and interoperability issues. To address this challenge, the proposed framework integrates axiomatic design principles with considerations for data integrity and domain ontology. Furthermore, this paper introduces a multi-level integrity rule repository for IoT application to provides a robust foundation for designing and maintaining IoT systems. To validate the effectiveness of this approach, we conducted a study across four domains of smart cities. The design's quality was assessed using model quality parameters, including completeness, consistency and validity. Our analysis shows that the semantic-aware axiomatic design framework can effectively address the problem of inconsistencies and low-quality design in scientific IoT environments, providing a more reliable and efficient solution.

在复杂、关键和快速发展的工业 4.0 制造业时代,成熟的工程学科可以在抽象层面验证系统设计,从而实现有效的无故障环境。然而,由于其固有的复杂性和互操作性问题,设计集成的物联网平台面临着巨大的挑战。为应对这一挑战,本文提出的框架将公理设计原则与数据完整性和领域本体的考虑因素整合在一起。此外,本文还为物联网应用引入了一个多层次的完整性规则库,为设计和维护物联网系统奠定了坚实的基础。为了验证这种方法的有效性,我们对智慧城市的四个领域进行了研究。我们使用模型质量参数(包括完整性、一致性和有效性)对设计质量进行了评估。我们的分析表明,语义感知公理设计框架能有效解决科学物联网环境中的不一致性和低质量设计问题,提供更可靠、更高效的解决方案。
{"title":"A semantic axiomatic design for integrity in IoT","authors":"Maryam Nooraei Abadeh","doi":"10.1002/ett.5032","DOIUrl":"https://doi.org/10.1002/ett.5032","url":null,"abstract":"<p>In the complex, critical, and rapidly evolving era of Industry 4.0 manufacturing, mature engineering disciplines can be developed to validate system designs at an abstract level, enabling effective fault-free environments. However, designing integrated IoT platforms presents significant challenges due to their inherent complexity and interoperability issues. To address this challenge, the proposed framework integrates axiomatic design principles with considerations for data integrity and domain ontology. Furthermore, this paper introduces a multi-level integrity rule repository for IoT application to provides a robust foundation for designing and maintaining IoT systems. To validate the effectiveness of this approach, we conducted a study across four domains of smart cities. The design's quality was assessed using model quality parameters, including completeness, consistency and validity. Our analysis shows that the semantic-aware axiomatic design framework can effectively address the problem of inconsistencies and low-quality design in scientific IoT environments, providing a more reliable and efficient solution.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142089773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing 5G massive MIMO systems with EfficientNet-B7-powered deep learning-driven beamforming 利用 EfficientNet-B7 驱动的深度学习波束成形技术增强 5G 大规模 MIMO 系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-26 DOI: 10.1002/ett.5034
Bendjillali Ridha Ilyas, Bendelhoum Mohammed Sofiane, Tadjeddine Ali Abderrazak, Kamline Miloud

The development of wireless communication systems is a challenging and constantly evolving field and the issue of gaining optimal performance is of utmost importance. This work intends to give a thorough and detailed description of massive MIMO technology and its properties, with a significant emphasis on digital beamforming (FDB) and hybrid beamforming (HBF) techniques and the potential of combining them with the most recent and exciting frontier of research: deep learning. On one hand, FDB provides accurate signal control but, on the other hand, it deals with substantial needs like high-power consumption. This challenge makes the focus shift to HBF—the innovative technology successfully coupled with deep learning's powerful potential. The chosen research explores extensively the major areas of application and compatibility of this operating mode in a diverse range of operational situations in the interference environment as well as in different levels of noise conditions. Moreover, the study offers a comprehensive comparison, which is highly effective in exploring further methods that focus on improving spectral efficiency. Significantly, the “Proposed Method” is suggested to be at the leading position, which demonstrates superior performance. Showing outstanding generalization capability, versatile robustness, and efficiency of usage in the proposed framework rely on EfficientNet-B7 as the major portion. This makes it adaptive to its dynamic surroundings and puts it as a powerful tool in the world of advanced connectivity and massive MIMO technology. Due to its core ability to respond to changes in conditions effectively and efficiently, the proposed framework is seen as one of the most powerful approaches that could be used to change wireless communication systems.

无线通信系统的开发是一个充满挑战且不断发展的领域,获得最佳性能的问题至关重要。本著作旨在全面、详细地介绍大规模多输入多输出技术及其特性,重点关注数字波束成形(FDB)和混合波束成形(HBF)技术,以及将它们与最新、最激动人心的研究前沿--深度学习--相结合的潜力。一方面,FDB 可提供精确的信号控制,但另一方面,它也需要处理大量需求,如高功耗。这一挑战使得研究重点转向 HBF--一种成功结合深度学习强大潜力的创新技术。所选研究广泛探讨了这种工作模式在干扰环境和不同噪声水平条件下各种运行情况下的主要应用领域和兼容性。此外,这项研究还提供了全面的比较,这对于进一步探索提高频谱效率的方法非常有效。值得注意的是,"拟议方法 "被认为处于领先地位,表现出卓越的性能。提议的框架以 EfficientNet-B7 为主要部分,显示出出色的泛化能力、多变的鲁棒性和使用效率。这使其能够适应动态环境,成为先进连接和大规模多输入多输出(MIMO)技术领域的有力工具。由于其对条件变化做出有效和高效反应的核心能力,拟议框架被视为可用于改变无线通信系统的最强大方法之一。
{"title":"Enhancing 5G massive MIMO systems with EfficientNet-B7-powered deep learning-driven beamforming","authors":"Bendjillali Ridha Ilyas,&nbsp;Bendelhoum Mohammed Sofiane,&nbsp;Tadjeddine Ali Abderrazak,&nbsp;Kamline Miloud","doi":"10.1002/ett.5034","DOIUrl":"https://doi.org/10.1002/ett.5034","url":null,"abstract":"<p>The development of wireless communication systems is a challenging and constantly evolving field and the issue of gaining optimal performance is of utmost importance. This work intends to give a thorough and detailed description of massive MIMO technology and its properties, with a significant emphasis on digital beamforming (FDB) and hybrid beamforming (HBF) techniques and the potential of combining them with the most recent and exciting frontier of research: deep learning. On one hand, FDB provides accurate signal control but, on the other hand, it deals with substantial needs like high-power consumption. This challenge makes the focus shift to HBF—the innovative technology successfully coupled with deep learning's powerful potential. The chosen research explores extensively the major areas of application and compatibility of this operating mode in a diverse range of operational situations in the interference environment as well as in different levels of noise conditions. Moreover, the study offers a comprehensive comparison, which is highly effective in exploring further methods that focus on improving spectral efficiency. Significantly, the “Proposed Method” is suggested to be at the leading position, which demonstrates superior performance. Showing outstanding generalization capability, versatile robustness, and efficiency of usage in the proposed framework rely on EfficientNet-B7 as the major portion. This makes it adaptive to its dynamic surroundings and puts it as a powerful tool in the world of advanced connectivity and massive MIMO technology. Due to its core ability to respond to changes in conditions effectively and efficiently, the proposed framework is seen as one of the most powerful approaches that could be used to change wireless communication systems.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142077839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid intrusion detection approach based on message queuing telemetry transport (MQTT) protocol in industrial internet of things 工业物联网中基于消息队列遥测传输(MQTT)协议的混合入侵检测方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-20 DOI: 10.1002/ett.5030
Georg Thamer Francis, Alireza Souri, Nihat İnanç

The number of attacks against Industrial Internet of Things (IIoT) devices has increased over the past years, particularly on widely used communication protocols like Message Queuing Telemetry Transfer (MQTT). The fast increase in IIoT applications brings both critical challenges and technical gaps in cybersecurity. On the other hand, traditional cyber-attack detection approaches scrap to address and support the run-time responsibilities of IIoT environments. This study presents a hybrid Genetic Algorithm and Random Forest (GA_RF) method for detecting cyber-attacks in Industrial Control Machines (ICS) that use MQTT protocol in the IIoT environment. This architecture integrates ICS with edge devices and cloud servers, using a GA_RF algorithm to detect anomalies in data collected by sensors. Normal data is processed locally and then sent to the cloud for storage and return, ensuring continuous monitoring and security. Also, the MQTT-IOT-IDS2020 dataset as a real test case was applied for prediction of the proposed GA_RF method with compare to some other powerful machine and deep learning models. The experimental results show that the proposed GA_RF method has an optimum accuracy of 99.87%–100% for detecting cyber-attacks. This hybrid algorithm also achieved 0–0.0015 in Mean Absolute Error (MAE) and 100% in Precision, Recall, and F-score factors. This result led to the proposed architecture, which connects the ICS to a server while running GA_RF on the IIoT environment. In conclusion, this study indicates the effectiveness of GA_RF and aims to improve security by using the MQTT protocol in IIoT.

在过去几年中,针对工业物联网(IIoT)设备的攻击数量不断增加,尤其是针对消息队列遥测传输(MQTT)等广泛使用的通信协议的攻击。IIoT 应用的快速增长给网络安全带来了严峻挑战和技术差距。另一方面,传统的网络攻击检测方法无法解决和支持物联网环境的运行时责任。本研究提出了一种混合遗传算法和随机森林(GA_RF)方法,用于检测 IIoT 环境中使用 MQTT 协议的工业控制机(ICS)中的网络攻击。该架构将 ICS 与边缘设备和云服务器集成在一起,使用 GA_RF 算法检测传感器收集的数据中的异常情况。正常数据在本地进行处理,然后发送到云端进行存储和返回,从而确保持续监控和安全性。此外,MQTT-IOT-IDS2020 数据集作为一个真实的测试案例,用于预测所提出的 GA_RF 方法,并与其他一些强大的机器和深度学习模型进行比较。实验结果表明,所提出的 GA_RF 方法在检测网络攻击方面具有 99.87%-100% 的最佳准确率。该混合算法的平均绝对误差(MAE)也达到了 0-0.0015,精确度、召回率和 F 分数均为 100%。根据这一结果,提出了在 IIoT 环境中运行 GA_RF 的同时将 ICS 连接到服务器的架构。总之,本研究表明了 GA_RF 的有效性,旨在通过在 IIoT 中使用 MQTT 协议来提高安全性。
{"title":"A hybrid intrusion detection approach based on message queuing telemetry transport (MQTT) protocol in industrial internet of things","authors":"Georg Thamer Francis,&nbsp;Alireza Souri,&nbsp;Nihat İnanç","doi":"10.1002/ett.5030","DOIUrl":"https://doi.org/10.1002/ett.5030","url":null,"abstract":"<p>The number of attacks against Industrial Internet of Things (IIoT) devices has increased over the past years, particularly on widely used communication protocols like Message Queuing Telemetry Transfer (MQTT). The fast increase in IIoT applications brings both critical challenges and technical gaps in cybersecurity. On the other hand, traditional cyber-attack detection approaches scrap to address and support the run-time responsibilities of IIoT environments. This study presents a hybrid Genetic Algorithm and Random Forest (GA_RF) method for detecting cyber-attacks in Industrial Control Machines (ICS) that use MQTT protocol in the IIoT environment. This architecture integrates ICS with edge devices and cloud servers, using a GA_RF algorithm to detect anomalies in data collected by sensors. Normal data is processed locally and then sent to the cloud for storage and return, ensuring continuous monitoring and security. Also, the MQTT-IOT-IDS2020 dataset as a real test case was applied for prediction of the proposed GA_RF method with compare to some other powerful machine and deep learning models. The experimental results show that the proposed GA_RF method has an optimum accuracy of 99.87%–100% for detecting cyber-attacks. This hybrid algorithm also achieved 0–0.0015 in Mean Absolute Error (MAE) and 100% in Precision, Recall, and F-score factors. This result led to the proposed architecture, which connects the ICS to a server while running GA_RF on the IIoT environment. In conclusion, this study indicates the effectiveness of GA_RF and aims to improve security by using the MQTT protocol in IIoT.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142013492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1