首页 > 最新文献

Wireless Networks最新文献

英文 中文
Metaheuristic assisted hybrid deep classifiers for intrusion detection: a bigdata perspective 元搜索辅助混合深度分类器用于入侵检测:大数据视角
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-24 DOI: 10.1007/s11276-024-03815-0
L. Madhuridevi, N. V. S. Sree Rathna Lakshmi

The growth of social networks and cloud computing has resulted in the production of enormous amounts of data, which poses significant challenges for intrusion detection systems (IDS). Big data management in the IDS system presents several important issues, such as delayed reaction times, imbalanced datasets, reduced detection rates, and false alarm rates. To overcome those drawbacks, this work introduces a novel Intrusion Detection System from the perspective of big data handling. Here, input data is handled with the Apache Spark. In the first phase (preprocessing), improved min–max normalization is performed. Subsequently, improved correlation and flow features are extracted since the information extraction from the data is more important to determine the appropriate class differences during attack detection. Subsequently, intrusion detection is done by a hybrid model, which fuses the long short term memory and optimized convolutional neural network (CNN). Then, the optimization-assisted training algorithm called elephant adapted cat swarm optimization (EA-CSO) is proposed that tunes the optimal weights of CNN to enhance the performance of detection. Finally, the performance of the adopted model is validated over the traditional models in terms of positive, negative and other metrics, and the proposed work shows its better performance over the other models. The accuracy of detecting the intrusions using the HC + EA-CSO model at 90th LP is high around 95.029 while other conventional models obtain minimal accuracy.

社交网络和云计算的发展产生了海量数据,给入侵检测系统(IDS)带来了巨大挑战。IDS 系统中的大数据管理存在几个重要问题,如反应时间延迟、数据集不平衡、检测率降低和误报率等。为了克服这些弊端,这项工作从大数据处理的角度引入了一种新型入侵检测系统。输入数据由 Apache Spark 处理。在第一阶段(预处理),执行改进的最小-最大归一化。随后,提取改进的相关性和流量特征,因为从数据中提取信息对于在攻击检测过程中确定适当的类别差异更为重要。随后,入侵检测由混合模型完成,该模型融合了长短期记忆和优化的卷积神经网络(CNN)。然后,提出了一种名为 "大象适应猫群优化(EA-CSO)"的优化辅助训练算法,该算法可以调整 CNN 的最佳权重,从而提高检测性能。最后,从正向、负向和其他指标方面对所采用模型的性能与传统模型进行了验证,结果表明所提出的工作比其他模型具有更好的性能。使用 HC + EA-CSO 模型在第 90 LP 值下检测入侵的准确率高达 95.029 左右,而其他传统模型的准确率极低。
{"title":"Metaheuristic assisted hybrid deep classifiers for intrusion detection: a bigdata perspective","authors":"L. Madhuridevi, N. V. S. Sree Rathna Lakshmi","doi":"10.1007/s11276-024-03815-0","DOIUrl":"https://doi.org/10.1007/s11276-024-03815-0","url":null,"abstract":"<p>The growth of social networks and cloud computing has resulted in the production of enormous amounts of data, which poses significant challenges for intrusion detection systems (IDS). Big data management in the IDS system presents several important issues, such as delayed reaction times, imbalanced datasets, reduced detection rates, and false alarm rates. To overcome those drawbacks, this work introduces a novel Intrusion Detection System from the perspective of big data handling. Here, input data is handled with the Apache Spark. In the first phase (preprocessing), improved min–max normalization is performed. Subsequently, improved correlation and flow features are extracted since the information extraction from the data is more important to determine the appropriate class differences during attack detection. Subsequently, intrusion detection is done by a hybrid model, which fuses the long short term memory and optimized convolutional neural network (CNN). Then, the optimization-assisted training algorithm called elephant adapted cat swarm optimization (EA-CSO) is proposed that tunes the optimal weights of CNN to enhance the performance of detection. Finally, the performance of the adopted model is validated over the traditional models in terms of positive, negative and other metrics, and the proposed work shows its better performance over the other models. The accuracy of detecting the intrusions using the HC + EA-CSO model at 90th LP is high around 95.029 while other conventional models obtain minimal accuracy.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"33 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141772782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient load balancing strategy for cloud computing environment with African vultures algorithm 采用非洲秃鹫算法的云计算环境高效负载均衡策略
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-20 DOI: 10.1007/s11276-024-03810-5
A. Sandana Karuppan, N. Bhalaji

Load balancing is essential in cloud computing (CC) to manage the increasing load on servers efficiently. This article proposes a load balancing strategy utilizing constraint measures to distribute the load evenly amongst the servers while minimizing power consumption. Firstly, the capacity and load of every Virtual Machine (VM) is evaluated, and tasks are assigned using the African Vultures Algorithm (AVA) when the load exceeds a predefined threshold. This approach aim is to minimize energy consumption, makespan, and data center usage. Additionally, a load balancing method computes critical features for each VM and assesses their load, followed by calculating selection factors for tasks. Tasks with superior selection factors are assigned to VMs. The proposed Efficient Load Balancing in Cloud Computing under African Vultures Algorithm (ELB-CC-AVA) demonstrates better performance in cloud environments, achieving lower makespan by 32.82%, 30.47%, and 25.32%, along with higher resource utilization rates of 38.22%, 40.21%, and 25.46% compared to the existing methods.

在云计算(CC)中,要有效管理服务器上不断增加的负载,负载平衡至关重要。本文提出了一种负载平衡策略,利用约束措施在服务器之间平均分配负载,同时最大限度地降低功耗。首先,评估每个虚拟机(VM)的容量和负载,当负载超过预定阈值时,使用非洲秃鹫算法(AVA)分配任务。这种方法旨在最大限度地降低能耗、时间跨度和数据中心使用率。此外,负载平衡方法会计算每个虚拟机的关键特征并评估其负载,然后计算任务的选择因子。选择系数高的任务会被分配给虚拟机。所提出的非洲秃鹫算法下的云计算高效负载平衡(ELB-CC-AVA)在云环境中表现出更好的性能,与现有的方法相比,它分别降低了 32.82%、30.47% 和 25.32% 的时间跨度,同时提高了 38.22%、40.21% 和 25.46% 的资源利用率。
{"title":"Efficient load balancing strategy for cloud computing environment with African vultures algorithm","authors":"A. Sandana Karuppan, N. Bhalaji","doi":"10.1007/s11276-024-03810-5","DOIUrl":"https://doi.org/10.1007/s11276-024-03810-5","url":null,"abstract":"<p>Load balancing is essential in cloud computing (CC) to manage the increasing load on servers efficiently. This article proposes a load balancing strategy utilizing constraint measures to distribute the load evenly amongst the servers while minimizing power consumption. Firstly, the capacity and load of every Virtual Machine (VM) is evaluated, and tasks are assigned using the African Vultures Algorithm (AVA) when the load exceeds a predefined threshold. This approach aim is to minimize energy consumption, makespan, and data center usage. Additionally, a load balancing method computes critical features for each VM and assesses their load, followed by calculating selection factors for tasks. Tasks with superior selection factors are assigned to VMs. The proposed Efficient Load Balancing in Cloud Computing under African Vultures Algorithm (ELB-CC-AVA) demonstrates better performance in cloud environments, achieving lower makespan by 32.82%, 30.47%, and 25.32%, along with higher resource utilization rates of 38.22%, 40.21%, and 25.46% compared to the existing methods.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"27 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141737094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient feature extraction of radio-frequency fingerprint using continuous wavelet transform 利用连续小波变换高效提取射频指纹特征
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-18 DOI: 10.1007/s11276-024-03817-y
Mutala Mohammed, Xinyong Peng, Zhi Chai, Mingye Li, Rahel Abayneh, Xuelin Yang

In securing wireless communication, radio-frequency (RF) fingerprints, rooted in physical-layer security, are seriously affected by various types of noise. As a result, effective RF fingerprint extraction and identification for device authentication present a significant challenge. To address this, we propose a comprehensive and robust approach using continuous wavelet transform (CWT) for RF feature extraction, along with U-Net for RFF identification. Initially, the received signal undergoes CWT into a stable time-frequency representation, while the U-Net algorithm is employed to denoise in RFF feature extraction and identification. The experiment results show, remarkable accuracies of 95.4% and 89.5% are achieved (SNR@ 10dB and 5dB), respectively, for 11 Wi-Fi devices with the same model. This underscores the potential of the proposed algorithms to enhance wireless communication security, providing a valuable contribution to RFF identification.

在确保无线通信安全方面,根植于物理层安全的射频(RF)指纹会受到各种噪声的严重影响。因此,有效提取和识别射频指纹用于设备验证是一项重大挑战。针对这一问题,我们提出了一种全面而稳健的方法,利用连续小波变换(CWT)进行射频特征提取,并利用 U-Net 进行射频指纹识别。首先,将接收到的信号经过 CWT 转换为稳定的时频表示,然后在 RFF 特征提取和识别中采用 U-Net 算法进行去噪。实验结果表明,对于 11 个具有相同型号的 Wi-Fi 设备,其识别准确率分别达到 95.4% 和 89.5%(信噪比分别为 10dB 和 5dB)。这凸显了所提算法在增强无线通信安全性方面的潜力,为 RFF 识别做出了宝贵贡献。
{"title":"Efficient feature extraction of radio-frequency fingerprint using continuous wavelet transform","authors":"Mutala Mohammed, Xinyong Peng, Zhi Chai, Mingye Li, Rahel Abayneh, Xuelin Yang","doi":"10.1007/s11276-024-03817-y","DOIUrl":"https://doi.org/10.1007/s11276-024-03817-y","url":null,"abstract":"<p>In securing wireless communication, radio-frequency (RF) fingerprints, rooted in physical-layer security, are seriously affected by various types of noise. As a result, effective RF fingerprint extraction and identification for device authentication present a significant challenge. To address this, we propose a comprehensive and robust approach using continuous wavelet transform (CWT) for RF feature extraction, along with U-Net for RFF identification. Initially, the received signal undergoes CWT into a stable time-frequency representation, while the U-Net algorithm is employed to denoise in RFF feature extraction and identification. The experiment results show, remarkable accuracies of 95.4% and 89.5% are achieved (SNR@ 10dB and 5dB), respectively, for 11 Wi-Fi devices with the same model. This underscores the potential of the proposed algorithms to enhance wireless communication security, providing a valuable contribution to RFF identification.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"14 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141737092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Power allocation using spatio-temporal graph neural networks and reinforcement learning 利用时空图神经网络和强化学习进行功率分配
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-17 DOI: 10.1007/s11276-024-03814-1
Saeed Jamshidiha, Vahid Pourahmadi, Abbas Mohammadi, Mehdi Bennis

This research investigates power allocation in wireless device-to-device (D2D) networks using spatio-temporal graph neural networks (STGNNs). Specifically, we address the challenge of sum-rate maximization in D2D networks by formulating it as a reinforcement learning problem. In our approach, STGNNs act as agents, generating optimal power allocations to maximize the reward function, which is the overall sum-rate of the network. Our study operates under the realistic assumption of delayed, local channel state information (CSI). Various user mobility patterns, including constant positions, velocities, and accelerations are simulated. The robustness of our proposed method is evaluated against delayed and noisy CSI, which are crucial factors in real-world scenarios. Furthermore, the fairness of our approach is compared to the well-established load-spillage algorithm, which is guaranteed to converge to the globally optimal solution of the alpha-fair utility maximization problem. Finally, the convergence behavior of our method is analyzed in comparison to the policy gradient approach. Our empirical results demonstrate that the proposed STGNN significantly outperforms both the WMMSE benchmark and memoryless graph neural networks (GNNs) across all simulated scenarios, and converges to the globally optimal solution of the load-spillage algorithm, with lower computational complexity. Specifically, it achieves a remarkable performance gap of over 400% compared to the WMMSE algorithm and approximately 10% improvement over the memoryless GNN. These findings underscore the efficacy of STGNNs in addressing power allocation challenges in wireless D2D networks.

本研究利用时空图神经网络(STGNN)研究无线设备对设备(D2D)网络中的功率分配。具体来说,我们将 D2D 网络中的总速率最大化问题表述为强化学习问题,从而解决了这一难题。在我们的方法中,STGNNs 作为代理,生成最优功率分配,以最大化奖励函数,即网络的总和速率。我们的研究是在延迟本地信道状态信息(CSI)的现实假设下进行的。我们模拟了各种用户移动模式,包括恒定位置、速度和加速度。评估了我们提出的方法对延迟和嘈杂 CSI 的鲁棒性,这些都是真实世界场景中的关键因素。此外,还将我们方法的公平性与成熟的负载溢出算法进行了比较,后者可保证收敛到阿尔法公平效用最大化问题的全局最优解。最后,将我们的方法与策略梯度方法进行了收敛行为分析。我们的实证结果表明,在所有模拟场景中,所提出的 STGNN 都明显优于 WMMSE 基准和无记忆图神经网络 (GNN),并能以更低的计算复杂度收敛到负载溢出算法的全局最优解。具体地说,与 WMMSE 算法相比,它实现了超过 400% 的显著性能差距,与无记忆 GNN 相比则提高了约 10%。这些发现强调了 STGNN 在解决无线 D2D 网络中功率分配难题方面的功效。
{"title":"Power allocation using spatio-temporal graph neural networks and reinforcement learning","authors":"Saeed Jamshidiha, Vahid Pourahmadi, Abbas Mohammadi, Mehdi Bennis","doi":"10.1007/s11276-024-03814-1","DOIUrl":"https://doi.org/10.1007/s11276-024-03814-1","url":null,"abstract":"<p>This research investigates power allocation in wireless device-to-device (D2D) networks using spatio-temporal graph neural networks (STGNNs). Specifically, we address the challenge of sum-rate maximization in D2D networks by formulating it as a reinforcement learning problem. In our approach, STGNNs act as agents, generating optimal power allocations to maximize the reward function, which is the overall sum-rate of the network. Our study operates under the realistic assumption of delayed, local channel state information (CSI). Various user mobility patterns, including constant positions, velocities, and accelerations are simulated. The robustness of our proposed method is evaluated against delayed and noisy CSI, which are crucial factors in real-world scenarios. Furthermore, the fairness of our approach is compared to the well-established load-spillage algorithm, which is guaranteed to converge to the globally optimal solution of the alpha-fair utility maximization problem. Finally, the convergence behavior of our method is analyzed in comparison to the policy gradient approach. Our empirical results demonstrate that the proposed STGNN significantly outperforms both the WMMSE benchmark and memoryless graph neural networks (GNNs) across all simulated scenarios, and converges to the globally optimal solution of the load-spillage algorithm, with lower computational complexity. Specifically, it achieves a remarkable performance gap of over 400% compared to the WMMSE algorithm and approximately 10% improvement over the memoryless GNN. These findings underscore the efficacy of STGNNs in addressing power allocation challenges in wireless D2D networks.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"50 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141721451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive connected hybrid beamforming for energy efficiency maximization in multi-user millimeter wave systems 多用户毫米波系统中实现能效最大化的自适应连接混合波束成形
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-10 DOI: 10.1007/s11276-024-03809-y
Guangyi Chen, Ruoyu Zhang, Chen Miao, Yue Ma, Wen Wu

Energy efficiency (EE) is a key enabler for sustainable green millimeter wave (mmWave) communication. However, conventional hybrid beamforming methods suffer from energy efficiency performance loss due to hardware limitations and the connected structure. To overcome these limitations, this work investigates a novel adaptive connected (AC) hybrid beamforming (HBF) design for multi-user mmWave systems. We formulate the problem as an EE maximization problem subject to the constraints of the adaptive connected structure, constant modulus, and power budget. Addressing this complicated non-convex problem, we harness the characteristics of the AC structure and introduce an iterative HBF design algorithm grounded in fractional programming. Numerical results demonstrate the effectiveness and flexibility of the proposed AC-based HBF design in terms of EE enhancement.

能效(EE)是实现可持续绿色毫米波(mmWave)通信的关键因素。然而,由于硬件限制和连接结构,传统的混合波束成形方法存在能效性能损失。为了克服这些局限性,这项工作研究了一种适用于多用户毫米波系统的新型自适应连接(AC)混合波束成形(HBF)设计。我们将该问题表述为一个 EE 最大化问题,该问题受到自适应连接结构、恒定模数和功率预算的约束。针对这一复杂的非凸问题,我们利用交流结构的特点,引入了一种基于分数编程的迭代 HBF 设计算法。数值结果表明了所提出的基于交流的 HBF 设计在增强 EE 方面的有效性和灵活性。
{"title":"Adaptive connected hybrid beamforming for energy efficiency maximization in multi-user millimeter wave systems","authors":"Guangyi Chen, Ruoyu Zhang, Chen Miao, Yue Ma, Wen Wu","doi":"10.1007/s11276-024-03809-y","DOIUrl":"https://doi.org/10.1007/s11276-024-03809-y","url":null,"abstract":"<p>Energy efficiency (EE) is a key enabler for sustainable green millimeter wave (mmWave) communication. However, conventional hybrid beamforming methods suffer from energy efficiency performance loss due to hardware limitations and the connected structure. To overcome these limitations, this work investigates a novel adaptive connected (AC) hybrid beamforming (HBF) design for multi-user mmWave systems. We formulate the problem as an EE maximization problem subject to the constraints of the adaptive connected structure, constant modulus, and power budget. Addressing this complicated non-convex problem, we harness the characteristics of the AC structure and introduce an iterative HBF design algorithm grounded in fractional programming. Numerical results demonstrate the effectiveness and flexibility of the proposed AC-based HBF design in terms of EE enhancement.\u0000</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"2 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm 利用改进的鹬鸟优化算法检测无线传感器网络中的恶意节点
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-10 DOI: 10.1007/s11276-024-03806-1
B. Vijaya Nirmala, K. Selvaraj

The most crucial thing about the Wireless Sensor Network (WSN) application is the validation of dangerous as well as remote sensing fields, which are expensive to perform by human insights. Further, these features may lead to the self-managed networking model, in which it faces numerous confronts in the network lifetime, fault tolerance, and energy consumption depending upon the non-renewable energy resources. The major advantages of the WSNs are regarded as the monitoring process as well as the nodes used in this network model are positioned commonly in harsh environments. Network management and its efficiency are considered as the most significant factor in network operation. Then, the faults in the WSN have been categorized in terms of persistence, behavior, and underlying causes according to the observation time. Due to its underlying causes in the WSN, the faults are categorized as incorrect computation fault, timing, omission, crash, and fail and stop. Consequently, due to the persistence, the faults are then categorized as a transient fault, intermittent, and permanent, and due to the behaviors, the fault is categorized as a soft and hard fault. As the recent conventional fault detection models failed to provide significant applications in WSN, this work suggests a new way of performing fault tolerance in WSN. In this research, a newly derived technique is implemented by using two functions like energy level checker and a routing manager for fault tolerance to detect malicious nodes in WSN. Here, the Energy level checker checks the residual energy for each communication. If the energy dissipation for a particular communication is less or higher than the threshold it does not send the packet, instead, it forwards the warning messages of the transmitted node that is further sent to the energy level checker. Next, the routing manager sends the path verification packets to the path, if acknowledgment is received, then, the packet is transmitted, and also Certificate Authority is issued to the trusted node based upon the amount of data packets transmitted and the amount of data packets that are successfully obtained. Finally, the prevention of fault nodes is done by selecting the trusted node using a new optimization algorithm known as the Modified Sandpiper Optimization Algorithm derived from the Sandpiper Optimization Algorithm. Another contribution of this WSN network for routing is the Cluster Head selection, which is carried out by solving the multi-objective function regarding constraints like trust, residual energy, distance, and delay. Moreover, the simulations have shown comparatively more success over others.

无线传感器网络(WSN)应用的最关键之处在于对危险领域和遥感领域的验证,而这些领域的验证需要耗费大量人力物力。此外,这些特点可能会导致自我管理的网络模式,在这种模式下,网络寿命、容错性和能源消耗(取决于不可再生的能源资源)都面临着诸多挑战。WSN 的主要优势被认为是监测过程,以及该网络模型中使用的节点通常位于恶劣环境中。网络管理及其效率被认为是网络运行中最重要的因素。然后,根据观察时间,从持续性、行为和根本原因等方面对 WSN 中的故障进行分类。根据 WSN 的根本原因,故障可分为计算错误故障、定时故障、遗漏故障、崩溃故障以及故障和停止故障。随后,根据故障的持续性,故障被分为瞬时故障、间歇故障和永久故障;根据故障的行为,故障被分为软故障和硬故障。由于最近的传统故障检测模型未能在 WSN 中提供重要应用,本研究提出了一种在 WSN 中执行容错的新方法。在这项研究中,通过使用能级检查器和路由管理器这两种功能来实现新衍生的容错技术,以检测 WSN 中的恶意节点。在这里,能级检查器检查每次通信的剩余能量。如果特定通信的能量消耗低于或高于阈值,它就不会发送数据包,而是转发所传送节点的警告信息,并进一步发送给能级检查器。接下来,路由管理器向路径发送路径验证数据包,如果收到确认,则传输数据包,并根据传输的数据包数量和成功获得的数据包数量向可信节点颁发证书授权。最后,通过使用一种从 Sandpiper 优化算法衍生出来的新优化算法(称为 "修正 Sandpiper 优化算法")来选择可信节点,从而防止出现故障节点。该 WSN 网络在路由选择方面的另一个贡献是簇头选择,它是通过解决有关信任、剩余能量、距离和延迟等约束条件的多目标函数来实现的。此外,模拟结果表明,该方案比其他方案更成功。
{"title":"Malicious node detection in wireless sensor network using modified sandpiper optimization algorithm","authors":"B. Vijaya Nirmala, K. Selvaraj","doi":"10.1007/s11276-024-03806-1","DOIUrl":"https://doi.org/10.1007/s11276-024-03806-1","url":null,"abstract":"<p>The most crucial thing about the Wireless Sensor Network (WSN) application is the validation of dangerous as well as remote sensing fields, which are expensive to perform by human insights. Further, these features may lead to the self-managed networking model, in which it faces numerous confronts in the network lifetime, fault tolerance, and energy consumption depending upon the non-renewable energy resources. The major advantages of the WSNs are regarded as the monitoring process as well as the nodes used in this network model are positioned commonly in harsh environments. Network management and its efficiency are considered as the most significant factor in network operation. Then, the faults in the WSN have been categorized in terms of persistence, behavior, and underlying causes according to the observation time. Due to its underlying causes in the WSN, the faults are categorized as incorrect computation fault, timing, omission, crash, and fail and stop. Consequently, due to the persistence, the faults are then categorized as a transient fault, intermittent, and permanent, and due to the behaviors, the fault is categorized as a soft and hard fault. As the recent conventional fault detection models failed to provide significant applications in WSN, this work suggests a new way of performing fault tolerance in WSN. In this research, a newly derived technique is implemented by using two functions like energy level checker and a routing manager for fault tolerance to detect malicious nodes in WSN. Here, the Energy level checker checks the residual energy for each communication. If the energy dissipation for a particular communication is less or higher than the threshold it does not send the packet, instead, it forwards the warning messages of the transmitted node that is further sent to the energy level checker. Next, the routing manager sends the path verification packets to the path, if acknowledgment is received, then, the packet is transmitted, and also Certificate Authority is issued to the trusted node based upon the amount of data packets transmitted and the amount of data packets that are successfully obtained. Finally, the prevention of fault nodes is done by selecting the trusted node using a new optimization algorithm known as the Modified Sandpiper Optimization Algorithm derived from the Sandpiper Optimization Algorithm. Another contribution of this WSN network for routing is the Cluster Head selection, which is carried out by solving the multi-objective function regarding constraints like trust, residual energy, distance, and delay. Moreover, the simulations have shown comparatively more success over others.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"3 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote radio frequency unit selection of self-sustaining distributed base-station system based on downlink physical layer secure transmission 基于下行物理层安全传输的自持分布式基站系统远程射频单元选择
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-09 DOI: 10.1007/s11276-024-03808-z
Xintong Zhou, Zhimin Huang, Kun Xiao

In the energy harvesting self-sustaining distributed base-station system (SS-DBS), the problem of optimal resource allocation for secure transmission at the downlink physical layer is studied, including the energy sharing mode, the power allocation, and the remote radio frequency unit (RRFU) selection. First, considering the existence of the eavesdropping user, an SS-DBS model, consisting of a baseband processing subsystem, an energy subsystem, and a radio frequency subsystem, is established for downlink secure transmission at the physical layer. Among the model, the remote radio frequency units are divided into secure remote radio frequency units that transmit secure information to the legitimate user and friendly cooperative remote radio frequency units that transmit artificial noise to interfere with the eavesdropping user. On this basis, a joint optimization problem of energy sharing, power allocation, and RRFU selection with the objective of maximizing the secure information rate of system is formulated. To solve this optimization problem, the problem is decomposed into an energy scheduling optimization subproblem and a RRFU selection optimization subproblem to solve separately. Through mathematical analysis and solution, the condition for the SS-DBS to adopt the partial energy sharing mode or the full energy sharing mode, the optimal power allocation of the RRFUs, and the RRFU selection algorithm for secure transmission at the physical layer of the SS-DBS downlink are obtained. Finally, Monte Carlo simulation is carried out and the simulation results verify the validity of the model and also show that the proposed algorithm has superior performance in terms of secure information rate and secure energy efficiency.

在能量收集自持分布式基站系统(SS-DBS)中,研究了下行物理层安全传输的最优资源分配问题,包括能量共享模式、功率分配和远程射频单元(RRFU)选择。首先,考虑到窃听用户的存在,建立了由基带处理子系统、能量子系统和射频子系统组成的 SS-DBS 模型,用于下行链路物理层的安全传输。在该模型中,远程射频单元分为向合法用户传输安全信息的安全远程射频单元和发射人工噪音干扰窃听用户的友好合作远程射频单元。在此基础上,以系统安全信息速率最大化为目标,提出了能量共享、功率分配和远程射频单元选择的联合优化问题。为解决该优化问题,将问题分解为能量调度优化子问题和 RRFU 选择优化子问题,分别求解。通过数学分析和求解,得到了 SS-DBS 采用部分能量共享模式或完全能量共享模式的条件、RRFU 的最优功率分配以及 SS-DBS 下行链路物理层安全传输的 RRFU 选择算法。最后,进行了蒙特卡罗仿真,仿真结果验证了模型的正确性,并表明所提出的算法在安全信息速率和安全能效方面具有优越的性能。
{"title":"Remote radio frequency unit selection of self-sustaining distributed base-station system based on downlink physical layer secure transmission","authors":"Xintong Zhou, Zhimin Huang, Kun Xiao","doi":"10.1007/s11276-024-03808-z","DOIUrl":"https://doi.org/10.1007/s11276-024-03808-z","url":null,"abstract":"<p>In the energy harvesting self-sustaining distributed base-station system (SS-DBS), the problem of optimal resource allocation for secure transmission at the downlink physical layer is studied, including the energy sharing mode, the power allocation, and the remote radio frequency unit (RRFU) selection. First, considering the existence of the eavesdropping user, an SS-DBS model, consisting of a baseband processing subsystem, an energy subsystem, and a radio frequency subsystem, is established for downlink secure transmission at the physical layer. Among the model, the remote radio frequency units are divided into secure remote radio frequency units that transmit secure information to the legitimate user and friendly cooperative remote radio frequency units that transmit artificial noise to interfere with the eavesdropping user. On this basis, a joint optimization problem of energy sharing, power allocation, and RRFU selection with the objective of maximizing the secure information rate of system is formulated. To solve this optimization problem, the problem is decomposed into an energy scheduling optimization subproblem and a RRFU selection optimization subproblem to solve separately. Through mathematical analysis and solution, the condition for the SS-DBS to adopt the partial energy sharing mode or the full energy sharing mode, the optimal power allocation of the RRFUs, and the RRFU selection algorithm for secure transmission at the physical layer of the SS-DBS downlink are obtained. Finally, Monte Carlo simulation is carried out and the simulation results verify the validity of the model and also show that the proposed algorithm has superior performance in terms of secure information rate and secure energy efficiency.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"71 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
English listening and speaking ability improvement strategy from Artificial Intelligence wireless network 从人工智能无线网络看英语听说能力提升策略
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-08 DOI: 10.1007/s11276-024-03812-3
Nan Hu

With the rapid development of science and technology, there are many derivatives of Artificial Intelligence (AI) technology based on wireless networks in the field of education, including intelligent learning systems. The learning strategy of English listening and speaking ability based on the intelligent learning system is studied to improve students’ English listening and speaking ability effectively. Firstly, the literature analysis method is used to analyze the problems that need attention in cultivating English listening and speaking abilities. Then, the current situation of students’ English listening and speaking learning is investigated through questionnaire surveys. Also, the problems existing in the learning process are sorted out and analyzed. Next, the feasibility of applying the intelligent learning system based on the AI wireless network to learning English listening and speaking ability is studied. A feasible strategy based on the intelligent learning system is proposed. Finally, based on the proposed strategy, the class with relatively poor English listening and speaking ability is used as the experimental object for experimental teaching. In addition, the data in the experimental process and the test before and after the experiment are analyzed to verify the effectiveness of the intelligent learning system in improving English listening and speaking ability. The results show that the learning strategy of an intelligent learning system based on an AI wireless network can effectively improve English listening and speaking ability and enhance students’ interest in learning English listening and speaking. The average listening ability of the students after the experiment is higher than that of 4.65 points before the experiment, the significance is 0.406 > 0.05, and the significant value in the homogeneous variance test is F = 0.045 < 0.05. The results indicate that there is a significant difference in the listening and speaking ability of the students before and after the experiment, and the listening and speaking ability of the students in the experimental group is significantly improved. Students have a high degree of recognition of the English listening and speaking learning system. This paper provides new ideas for applying and expanding AI technology in English teaching.

随着科学技术的飞速发展,教育领域出现了许多基于无线网络的人工智能(AI)技术衍生品,其中就包括智能学习系统。为了有效提高学生的英语听说能力,研究了基于智能学习系统的英语听说能力学习策略。首先,采用文献分析法,分析英语听说能力培养中需要注意的问题。然后,通过问卷调查了解学生英语听说学习的现状。同时,对学习过程中存在的问题进行梳理和分析。接着,研究了将基于人工智能无线网络的智能学习系统应用于英语听说能力学习的可行性。提出了基于智能学习系统的可行策略。最后,根据提出的策略,以英语听说能力相对较差的班级为实验对象进行实验教学。此外,还对实验过程中的数据和实验前后的测试数据进行了分析,以验证智能学习系统在提高英语听说能力方面的有效性。结果表明,基于人工智能无线网络的智能学习系统的学习策略能有效提高英语听说能力,增强学生学习英语听说的兴趣。实验后学生的平均听力能力比实验前提高了4.65分,显著性为0.406 >0.05,同质性方差检验的显著值为F=0.045 <0.05。结果表明,实验前后学生的听说能力存在显著差异,实验组学生的听说能力明显提高。学生对英语听说学习体系的认可度较高。本文为人工智能技术在英语教学中的应用和拓展提供了新思路。
{"title":"English listening and speaking ability improvement strategy from Artificial Intelligence wireless network","authors":"Nan Hu","doi":"10.1007/s11276-024-03812-3","DOIUrl":"https://doi.org/10.1007/s11276-024-03812-3","url":null,"abstract":"<p>With the rapid development of science and technology, there are many derivatives of Artificial Intelligence (AI) technology based on wireless networks in the field of education, including intelligent learning systems. The learning strategy of English listening and speaking ability based on the intelligent learning system is studied to improve students’ English listening and speaking ability effectively. Firstly, the literature analysis method is used to analyze the problems that need attention in cultivating English listening and speaking abilities. Then, the current situation of students’ English listening and speaking learning is investigated through questionnaire surveys. Also, the problems existing in the learning process are sorted out and analyzed. Next, the feasibility of applying the intelligent learning system based on the AI wireless network to learning English listening and speaking ability is studied. A feasible strategy based on the intelligent learning system is proposed. Finally, based on the proposed strategy, the class with relatively poor English listening and speaking ability is used as the experimental object for experimental teaching. In addition, the data in the experimental process and the test before and after the experiment are analyzed to verify the effectiveness of the intelligent learning system in improving English listening and speaking ability. The results show that the learning strategy of an intelligent learning system based on an AI wireless network can effectively improve English listening and speaking ability and enhance students’ interest in learning English listening and speaking. The average listening ability of the students after the experiment is higher than that of 4.65 points before the experiment, the significance is 0.406 &gt; 0.05, and the significant value in the homogeneous variance test is F = 0.045 &lt; 0.05. The results indicate that there is a significant difference in the listening and speaking ability of the students before and after the experiment, and the listening and speaking ability of the students in the experimental group is significantly improved. Students have a high degree of recognition of the English listening and speaking learning system. This paper provides new ideas for applying and expanding AI technology in English teaching.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"10 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crystals kyber cryptographic algorithm for efficient IoT D2d communication 用于高效物联网 D2d 通信的晶体凯博加密算法
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-07 DOI: 10.1007/s11276-024-03790-6
S. Selvakumar, A. Ahilan, B. Ben Sujitha, N. Muthukumaran

Device-to-Device (D2D) communication stands as a pivotal technology revolutionizing conventional base station-to-device (B2D) communication paradigms. It facilitates direct data exchange among Internet of Things (IoT) devices without intermediaries such as servers or cloud services. However, the direct link between devices poses significant security risks, such as data leaks and unauthorized access. In this paper, a novel Secure data Transmission using Crystals Kyber (STUCK) technique has been proposed to secure device-to-device communication efficiently. STUCK encompasses four pivotal phases: token generation, device discovery, link configuration, and secure data transmission, ensuring robust protection against potential security breaches. Leveraging the Crystals Kyber cryptographic technique, STUCK adeptly manages key operations, encrypts and decrypts data, thus ensuring the integrity of data transmission across devices. Experimental validation conducted in MATLAB validates the efficacy of the proposed system, revealing noteworthy performance metrics encompassing processing time, communication overhead, and encryption duration. Comparative analysis demonstrates superior performance of STUCK, showcasing processing time increases of 23.07%, 44.23%, and 65.38% compared to existing techniques such as B-IoMV, LMECC, and QSAP, respectively.

设备到设备(D2D)通信是彻底改变传统基站到设备(B2D)通信模式的关键技术。它促进了物联网(IoT)设备之间的直接数据交换,而无需服务器或云服务等中介。然而,设备之间的直接链接会带来巨大的安全风险,如数据泄露和未经授权的访问。本文提出了一种新型的使用 Kyber 晶体的安全数据传输(STUCK)技术,以确保设备与设备之间的通信安全。STUCK 包括四个关键阶段:令牌生成、设备发现、链路配置和安全数据传输,确保对潜在的安全漏洞提供强有力的保护。利用 Crystals Kyber 加密技术,STUCK 能够熟练地管理密钥操作、加密和解密数据,从而确保跨设备数据传输的完整性。在 MATLAB 中进行的实验验证验证了所提系统的功效,揭示了包括处理时间、通信开销和加密持续时间在内的值得注意的性能指标。对比分析表明 STUCK 性能优越,与 B-IoMV、LMECC 和 QSAP 等现有技术相比,处理时间分别增加了 23.07%、44.23% 和 65.38%。
{"title":"Crystals kyber cryptographic algorithm for efficient IoT D2d communication","authors":"S. Selvakumar, A. Ahilan, B. Ben Sujitha, N. Muthukumaran","doi":"10.1007/s11276-024-03790-6","DOIUrl":"https://doi.org/10.1007/s11276-024-03790-6","url":null,"abstract":"<p>Device-to-Device (D2D) communication stands as a pivotal technology revolutionizing conventional base station-to-device (B2D) communication paradigms. It facilitates direct data exchange among Internet of Things (IoT) devices without intermediaries such as servers or cloud services. However, the direct link between devices poses significant security risks, such as data leaks and unauthorized access. In this paper, a novel Secure data Transmission using Crystals Kyber (STUCK) technique has been proposed to secure device-to-device communication efficiently. STUCK encompasses four pivotal phases: token generation, device discovery, link configuration, and secure data transmission, ensuring robust protection against potential security breaches. Leveraging the Crystals Kyber cryptographic technique, STUCK adeptly manages key operations, encrypts and decrypts data, thus ensuring the integrity of data transmission across devices. Experimental validation conducted in MATLAB validates the efficacy of the proposed system, revealing noteworthy performance metrics encompassing processing time, communication overhead, and encryption duration. Comparative analysis demonstrates superior performance of STUCK, showcasing processing time increases of 23.07%, 44.23%, and 65.38% compared to existing techniques such as B-IoMV, LMECC, and QSAP, respectively.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"40 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fairness-aware placement of multiple aerial base stations in wireless networks 无线网络中多个空中基站的公平感知布局
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1007/s11276-024-03805-2
Mojtaba Shojaei, Ali Hosseini, Alireza Shafieinejad

In this paper, we investigate the joint placement of aerial Base Stations (BSs) and power control of BSs and users’ association to maximize the sum of the receive rates of end users. We formulate this problem as a mixed integer nonlinear optimization problem and propose a heuristic algorithm based on clustering. The algorithm focuses on a set of users with the lowest rates and clusters them into k groups. The centroid of each group is considered as a candidate for the initial placement of an aerial BS. The optimization loop starts by locating an aerial BS and then proceeds to three subalgorithms: updating power control, users’ association update, and aerial BS location. The results show that adding a single aerial BS improves the average user rate by approximately 18%, while reducing the total transmission power by 44%. Moreover, our proposed algorithm outperforms baseline PSO (Particle Swarm Optimization) schemes in terms of average user rate.

在本文中,我们研究了空中基站(BS)的联合布置、BS 的功率控制以及用户关联,以最大化终端用户的接收率之和。我们将这一问题表述为一个混合整数非线性优化问题,并提出了一种基于聚类的启发式算法。该算法侧重于一组速率最低的用户,并将其聚类为 k 组。每个组的中心点被视为空中基站初始位置的候选者。优化循环从定位空中基站开始,然后进行三个子算法:更新功率控制、用户关联更新和空中基站定位。结果表明,增加一个空中基站可将平均用户速率提高约 18%,同时将总传输功率降低 44%。此外,就平均用户速率而言,我们提出的算法优于基线 PSO(粒子群优化)方案。
{"title":"Fairness-aware placement of multiple aerial base stations in wireless networks","authors":"Mojtaba Shojaei, Ali Hosseini, Alireza Shafieinejad","doi":"10.1007/s11276-024-03805-2","DOIUrl":"https://doi.org/10.1007/s11276-024-03805-2","url":null,"abstract":"<p>In this paper, we investigate the joint placement of aerial Base Stations (BSs) and power control of BSs and users’ association to maximize the sum of the receive rates of end users. We formulate this problem as a mixed integer nonlinear optimization problem and propose a heuristic algorithm based on clustering. The algorithm focuses on a set of users with the lowest rates and clusters them into k groups. The centroid of each group is considered as a candidate for the initial placement of an aerial BS. The optimization loop starts by locating an aerial BS and then proceeds to three subalgorithms: updating power control, users’ association update, and aerial BS location. The results show that adding a single aerial BS improves the average user rate by approximately 18%, while reducing the total transmission power by 44%. Moreover, our proposed algorithm outperforms baseline PSO (Particle Swarm Optimization) schemes in terms of average user rate.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"16 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141574488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Wireless Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1