首页 > 最新文献

Wireless Networks最新文献

英文 中文
An energy efficient grid-based clustering algorithm using type-3 fuzzy system in wireless sensor networks 无线传感器网络中使用第三类模糊系统的高能效网格聚类算法
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-06 DOI: 10.1007/s11276-024-03737-x
Morteza Mozaffari, Sayyed Majid Mazinani, Ali Akbar Khazaei

The efficient management of energy in wireless sensor networks (WSNs) is a primary concern among researchers. Clustering algorithms serve as a crucial technique to address this issue. However, the initial uncertainties in both measuring the WSN’s values and in node localization due to GPS lead to secondary uncertainties like residual energy of nodes, cluster centrality, and distance from the cluster to the base station in the higher layers of WSNs. In this study, we have incorporated five improvements to our previous algorithm “FSCVG: A Fuzzy Semi‑Distributed Clustering Using Virtual Grids in WSN”. Firstly, we have discussed and classified uncertainties into two categories: primary uncertainties and secondary uncertainties. Secondly, we have applied a Type-3 fuzzy system to handle secondary uncertainties. Thirdly, we have used an adaptive imaginary grid to generate uneven clusters and balance the load according to the base station location. Fourthly, both decentralized and centralized clustering have applied based on new adaptive imaginary grid updates. Finally, we have determined the threshold level of each cluster proportionally, based on the energy of nodes within the same cluster. The findings of these improvements indicate an increased lifetime of the network concerning comparable methods.

在无线传感器网络(WSN)中有效管理能源是研究人员关注的首要问题。聚类算法是解决这一问题的关键技术。然而,在测量 WSN 的值和由于 GPS 而导致的节点定位方面,最初的不确定性导致了次要的不确定性,如节点的剩余能量、簇中心性以及簇到 WSN 高层基站的距离。在本研究中,我们对之前的算法 "FSCVG:一种在 WSN 中使用虚拟网格的模糊半分布式聚类 "进行了五项改进。首先,我们讨论并将不确定性分为两类:主要不确定性和次要不确定性。其次,我们采用了第三类模糊系统来处理次要不确定性。第三,我们使用了自适应虚网格来生成不均匀的簇,并根据基站位置来平衡负载。第四,我们根据新的自适应虚网格更新应用了分散式和集中式聚类。最后,我们根据同一簇内节点的能量,按比例确定了每个簇的阈值水平。这些改进的结果表明,与同类方法相比,网络的寿命有所延长。
{"title":"An energy efficient grid-based clustering algorithm using type-3 fuzzy system in wireless sensor networks","authors":"Morteza Mozaffari, Sayyed Majid Mazinani, Ali Akbar Khazaei","doi":"10.1007/s11276-024-03737-x","DOIUrl":"https://doi.org/10.1007/s11276-024-03737-x","url":null,"abstract":"<p>The efficient management of energy in wireless sensor networks (WSNs) is a primary concern among researchers. Clustering algorithms serve as a crucial technique to address this issue. However, the initial uncertainties in both measuring the WSN’s values and in node localization due to GPS lead to secondary uncertainties like residual energy of nodes, cluster centrality, and distance from the cluster to the base station in the higher layers of WSNs. In this study, we have incorporated five improvements to our previous algorithm “FSCVG: A Fuzzy Semi‑Distributed Clustering Using Virtual Grids in WSN”. Firstly, we have discussed and classified uncertainties into two categories: primary uncertainties and secondary uncertainties. Secondly, we have applied a Type-3 fuzzy system to handle secondary uncertainties. Thirdly, we have used an adaptive imaginary grid to generate uneven clusters and balance the load according to the base station location. Fourthly, both decentralized and centralized clustering have applied based on new adaptive imaginary grid updates. Finally, we have determined the threshold level of each cluster proportionally, based on the energy of nodes within the same cluster. The findings of these improvements indicate an increased lifetime of the network concerning comparable methods.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"110 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140881817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An online approach for cooperative cache updating and forwarding in mobile edge network 移动边缘网络中合作更新缓存和转发的在线方法
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-06 DOI: 10.1007/s11276-024-03749-7
Manoj Kumar Somesula, Banalaxmi Brahma, Mekala Ratna Raju, Sai Krishna Mothku

The proliferation of technological advancement in the Internet of Things (IoT) and mobile devices accelerates the need for latency-sensitive multimedia applications. The network operator may charge application vendors to cache their content. Vendors risk losing their user base if users don’t receive the expected Quality of Service (QoS), which includes meeting specific delay thresholds for services like video on demand. While multiple content copies can enhance QoS by delivering content quickly, maintaining redundant copies is costly. Therefore, deploying edge servers at edge nodes and caching content is a prominent solution for application vendors. This approach guarantees lower latency, fewer content replicas, and reduced strain on backhaul links. However, the limited cache capabilities of individual edge nodes present challenges, such as efficiently allocating scarce resources to meet user demands. This work addresses the earlier challenges by formulating a cooperative content caching and forwarding problem by placing the various latency-sensitive content to minimize the total cost with resource and deadline constraints. The problem is formulated as an integer linear programming problem for cooperative caching in mobile edge networks to mitigate the total cost to the application vendors. In the absence of content popularity information, an online cooperative caching mechanism is presented to solve the dynamic content request and forwarding problem. Extensive simulations have been performed to illustrate that the proposed online algorithm significantly enhances the performance in terms of the total cost, load on the cloud, hit ratio, time utility, and cache utilization.

物联网(IoT)和移动设备的技术进步加速了对延迟敏感的多媒体应用的需求。网络运营商可能会向应用供应商收取缓存内容的费用。如果用户不能获得预期的服务质量(QoS),包括满足视频点播等服务的特定延迟阈值,供应商就有可能失去用户群。虽然多个内容副本可以通过快速交付内容来提高 QoS,但维护冗余副本的成本很高。因此,在边缘节点部署边缘服务器并缓存内容是应用供应商的一个重要解决方案。这种方法能保证更低的延迟、更少的内容副本,并减少对回程链路的压力。然而,单个边缘节点有限的缓存能力带来了挑战,例如如何有效分配稀缺资源以满足用户需求。为应对上述挑战,本研究提出了一个合作内容缓存和转发问题,即在资源和截止日期限制下,将各种对延迟敏感的内容放置在一起,以最小化总成本。该问题被表述为移动边缘网络中合作缓存的整数线性编程问题,以降低应用供应商的总成本。在没有内容流行度信息的情况下,提出了一种在线合作缓存机制来解决动态内容请求和转发问题。通过大量仿真说明,所提出的在线算法在总成本、云负载、命中率、时间效用和高速缓存利用率等方面显著提高了性能。
{"title":"An online approach for cooperative cache updating and forwarding in mobile edge network","authors":"Manoj Kumar Somesula, Banalaxmi Brahma, Mekala Ratna Raju, Sai Krishna Mothku","doi":"10.1007/s11276-024-03749-7","DOIUrl":"https://doi.org/10.1007/s11276-024-03749-7","url":null,"abstract":"<p>The proliferation of technological advancement in the Internet of Things (IoT) and mobile devices accelerates the need for latency-sensitive multimedia applications. The network operator may charge application vendors to cache their content. Vendors risk losing their user base if users don’t receive the expected Quality of Service (QoS), which includes meeting specific delay thresholds for services like video on demand. While multiple content copies can enhance QoS by delivering content quickly, maintaining redundant copies is costly. Therefore, deploying edge servers at edge nodes and caching content is a prominent solution for application vendors. This approach guarantees lower latency, fewer content replicas, and reduced strain on backhaul links. However, the limited cache capabilities of individual edge nodes present challenges, such as efficiently allocating scarce resources to meet user demands. This work addresses the earlier challenges by formulating a cooperative content caching and forwarding problem by placing the various latency-sensitive content to minimize the total cost with resource and deadline constraints. The problem is formulated as an integer linear programming problem for cooperative caching in mobile edge networks to mitigate the total cost to the application vendors. In the absence of content popularity information, an online cooperative caching mechanism is presented to solve the dynamic content request and forwarding problem. Extensive simulations have been performed to illustrate that the proposed online algorithm significantly enhances the performance in terms of the total cost, load on the cloud, hit ratio, time utility, and cache utilization.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"20 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140882117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning to allocate: a delay and temperature-aware slot allocation framework for WBAN with TDMA-MAC 学会分配:采用 TDMA-MAC 的 WBAN 的延迟和温度感知时隙分配框架
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-06 DOI: 10.1007/s11276-024-03753-x
K. Jasmine Mystica, J. Martin Leo Manickam

Data aggregation in the Wireless Body Area Networks (WBAN) is a multidimensional problem. It can be addressed at different levels of the network. The proposed work identifies the scheduling problem for the slots in a Time Division Multiple Access Medium Access Control (TDMA-MAC) superframe. A resource-constrained single channel WBAN is considered, and the proposed work models the set of nodes and slots of one subframe as a bipartite graph and aims to obtain a globally optimal matching solution for one subframe with end-to-end latency and temperature rise minimization as prime goals. Later, it extends the solution to the entire superframe, which consists of several subframes. The proposed Learning to Allocate (LTA) framework uses a Multi-Agent Reinforcement Learning (MARL)-based dynamic bipartite weight update. The proposed Reinforcement Learning-Optimized Delay and Temperature Aware Scheduling (RL-ODTAS) algorithm deployed on a WBAN co-ordinator was tested on a custom-made simulation testbed with heterogeneous nodes that handle two categories of data. The simulation results indicate an average of 14.15% end-to-end delay improvement for emergency data. Also, at the end of 1500 superframes, a temperature rise reduction of up to 0.43 °C is seen compared to Hungarian Matching without a learning component.

无线体域网(WBAN)中的数据聚合是一个多维问题。它可以在网络的不同层面加以解决。本文提出了时分多址介质访问控制(TDMA-MAC)超帧中的时隙调度问题。考虑了资源受限的单信道 WBAN,提出的工作将一个子帧的节点和时隙集建模为双向图,并以端到端延迟和温升最小化为首要目标,旨在获得一个子帧的全局最优匹配解决方案。随后,它将解决方案扩展到由多个子帧组成的整个超帧。拟议的学习分配(LTA)框架采用基于多代理强化学习(MARL)的动态双向权重更新。在定制的仿真测试平台上测试了部署在 WBAN 协调器上的强化学习-优化延迟和温度感知调度(RL-ODTAS)算法,该平台上有处理两类数据的异构节点。模拟结果表明,紧急数据的端到端延迟平均改善了 14.15%。此外,在 1500 个超级帧结束时,与不带学习组件的匈牙利匹配相比,温升最高可降低 0.43 °C。
{"title":"Learning to allocate: a delay and temperature-aware slot allocation framework for WBAN with TDMA-MAC","authors":"K. Jasmine Mystica, J. Martin Leo Manickam","doi":"10.1007/s11276-024-03753-x","DOIUrl":"https://doi.org/10.1007/s11276-024-03753-x","url":null,"abstract":"<p>Data aggregation in the Wireless Body Area Networks (WBAN) is a multidimensional problem. It can be addressed at different levels of the network. The proposed work identifies the scheduling problem for the slots in a Time Division Multiple Access Medium Access Control (TDMA-MAC) superframe. A resource-constrained single channel WBAN is considered, and the proposed work models the set of nodes and slots of one subframe as a bipartite graph and aims to obtain a globally optimal matching solution for one subframe with end-to-end latency and temperature rise minimization as prime goals. Later, it extends the solution to the entire superframe, which consists of several subframes. The proposed Learning to Allocate (LTA) framework uses a Multi-Agent Reinforcement Learning (MARL)-based dynamic bipartite weight update. The proposed Reinforcement Learning-Optimized Delay and Temperature Aware Scheduling (RL-ODTAS) algorithm deployed on a WBAN co-ordinator was tested on a custom-made simulation testbed with heterogeneous nodes that handle two categories of data. The simulation results indicate an average of 14.15% end-to-end delay improvement for emergency data. Also, at the end of 1500 superframes, a temperature rise reduction of up to 0.43 °C is seen compared to Hungarian Matching without a learning component.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"24 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140881923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network 异构无线传感器网络中基于分层增强身份的数字签名的安全认证和密钥管理
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-06 DOI: 10.1007/s11276-024-03745-x
Siddiq Iqbal, B. R. Sujatha

Nowadays, secured data transmission has become the most desired need for all networks. Ensuring secure authentication and data transmission in the network is a significant and important task in a heterogeneous wireless sensor network (HWSN). Even though several models are adopted in the network, offering secure authentication and sustaining the energy along with key management is still considered a major problem in the research community. Thus, in this paper, a novel energy efficient clustering and routing algorithm is proposed based on the Hierarchical enhanced identity based digital signature (Hierarchical-EIDS) algorithm in HWSN. Initially, an efficient clustering and cluster head (CH) selection are performed using a fuzzy transient search algorithm (FTSA) in order to play a significant role in energy consumption. In the next stage, adaptive Aquila optimization (AAO) has been introduced to define the optimal route for efficient data transmission. To overcome the mutual authentication, bilinear pairings, and public key generation, a Hierarchical-EIDS scheme is applied. Here, the homomorphic equilibrium (HE) algorithm is employed to generate a key for a particular sensor node (SN). The proposed method is implemented in MATLAB, and a comparative analysis has been carried out to determine the efficacy of the model. As a result, the proposed method accomplishes better performance in terms of security strength (0.08 per packet), average energy (AE) consumption (8.861 J), average end-to-end (AEE) delay (0.344 ms), and key length (1900 character). The acquired results outperform the existing models and prove their effectiveness.

如今,安全数据传输已成为所有网络的最大需求。确保网络安全认证和数据传输是异构无线传感器网络(HWSN)的一项重要任务。尽管网络中采用了多种模式,但提供安全认证和维持能量以及密钥管理仍被认为是研究界的一大难题。因此,本文在 HWSN 中提出了一种基于分层增强身份数字签名(Hierarchical-EIDS)算法的新型节能聚类和路由算法。首先,使用模糊瞬态搜索算法(FTSA)进行高效聚类和簇头(CH)选择,以便在能耗方面发挥重要作用。在下一阶段,引入了自适应阿奎拉优化算法(AAO),以确定高效数据传输的最佳路径。为了克服相互验证、双线性配对和公钥生成等问题,我们采用了分层-EIDS 方案。该方案采用同态均衡(HE)算法为特定传感器节点(SN)生成密钥。提出的方法在 MATLAB 中实现,并进行了比较分析,以确定模型的有效性。结果表明,所提出的方法在安全强度(每个数据包 0.08)、平均能量(AE)消耗(8.861 J)、平均端到端(AEE)延迟(0.344 ms)和密钥长度(1900 个字符)方面都有更好的表现。获得的结果优于现有模型,证明了其有效性。
{"title":"Secure authentication and key management based on hierarchical enhanced identity based digital signature in heterogeneous wireless sensor network","authors":"Siddiq Iqbal, B. R. Sujatha","doi":"10.1007/s11276-024-03745-x","DOIUrl":"https://doi.org/10.1007/s11276-024-03745-x","url":null,"abstract":"<p>Nowadays, secured data transmission has become the most desired need for all networks. Ensuring secure authentication and data transmission in the network is a significant and important task in a heterogeneous wireless sensor network (HWSN). Even though several models are adopted in the network, offering secure authentication and sustaining the energy along with key management is still considered a major problem in the research community. Thus, in this paper, a novel energy efficient clustering and routing algorithm is proposed based on the Hierarchical enhanced identity based digital signature (Hierarchical-EIDS) algorithm in HWSN. Initially, an efficient clustering and cluster head (CH) selection are performed using a fuzzy transient search algorithm (FTSA) in order to play a significant role in energy consumption. In the next stage, adaptive Aquila optimization (AAO) has been introduced to define the optimal route for efficient data transmission. To overcome the mutual authentication, bilinear pairings, and public key generation, a Hierarchical-EIDS scheme is applied. Here, the homomorphic equilibrium (HE) algorithm is employed to generate a key for a particular sensor node (SN). The proposed method is implemented in MATLAB, and a comparative analysis has been carried out to determine the efficacy of the model. As a result, the proposed method accomplishes better performance in terms of security strength (0.08 per packet), average energy (AE) consumption (8.861 J), average end-to-end (AEE) delay (0.344 ms), and key length (1900 character). The acquired results outperform the existing models and prove their effectiveness.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"27 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140882107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-enabled software defined data collection from an adaptive WSN 自适应 WSN 的无人机软件定义数据采集
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-29 DOI: 10.1007/s11276-024-03744-y
Pejman A. Karegar, Duaa Zuhair Al-Hamid, Peter Han Joo Chong

Unmanned aerial vehicle (UAV)-based data gathering from wireless sensor networks is one of the recent research topics that has currently attracted research interest. One of the challenges for the UAV-aided WSN data collection efforts is to design an energy-efficient UAV/drone communication with arbitrarily dispersed ground sensors by improving the ground network structure. This paper aims to develop a technique titled UAV Fuzzy Travel Path' that supports UAV smooth path design and enables ground network topology shifting. A comprehensive UAV-based data collection model is proposed to enable dynamic orchestration/re-orchestration of wireless ground sensors to jointly improve network performance and UAV path fluidity. This provides a more flexible ground network framework that can be restructured based on network demands and UAV optimal paths, effectively allowing for a software-defined network concept. The main contribution of this work is the implementation of the software-defined wireless sensor network on the ground network that adaptably supports the movement of the UAV and enhances the communication network’s energy efficiency with a proposed latency analytical analysis via network orchestration/re-orchestration phases. The main significance of this research is in offering a flexible span for UAV path design than being fixed in one strict route for data gathering purposes. Four various simulation tools are employed for modelling and performance evaluation, namely MATLAB, CupCarbon, Contiki-Cooja and Mission Planner. The proposed software-defined ground network system demonstrates encouraging results in terms of network performance metrics including energy consumption of UAV versus ground sensor nodes energy usage, packet delivery rate, and the communication time of the ground orchestrated or/and re-orchestrated network.

基于无人飞行器(UAV)的无线传感器网络数据收集是近年来备受关注的研究课题之一。无人机辅助无线传感器网络数据收集工作面临的挑战之一,是如何通过改进地面网络结构,设计一种与任意分散的地面传感器进行高能效无人机/无人机通信的方法。本文旨在开发一种名为 "无人机模糊行进路线 "的技术,该技术可支持无人机的平滑路径设计,并实现地面网络拓扑结构的转换。本文提出了一种基于无人机的综合数据采集模型,以实现无线地面传感器的动态协调/再协调,从而共同提高网络性能和无人机路径的流畅性。这提供了一个更灵活的地面网络框架,可根据网络需求和无人机最佳路径进行重组,有效实现了软件定义网络的概念。这项工作的主要贡献是在地面网络上实现了软件定义的无线传感器网络,该网络可适应性地支持无人机的移动,并通过网络编排/再编排阶段的延迟分析建议提高通信网络的能效。这项研究的主要意义在于为无人机路径设计提供一个灵活的跨度,而不是固定在一条严格的路径上进行数据采集。在建模和性能评估中使用了四种不同的模拟工具,即 MATLAB、CupCarbon、Contiki-Cooja 和 Mission Planner。拟议的软件定义地面网络系统在网络性能指标方面取得了令人鼓舞的成果,包括无人机能耗与地面传感器节点能耗、数据包传输率以及地面协调或/和重新协调网络的通信时间。
{"title":"UAV-enabled software defined data collection from an adaptive WSN","authors":"Pejman A. Karegar, Duaa Zuhair Al-Hamid, Peter Han Joo Chong","doi":"10.1007/s11276-024-03744-y","DOIUrl":"https://doi.org/10.1007/s11276-024-03744-y","url":null,"abstract":"<p>Unmanned aerial vehicle (UAV)-based data gathering from wireless sensor networks is one of the recent research topics that has currently attracted research interest. One of the challenges for the UAV-aided WSN data collection efforts is to design an energy-efficient UAV/drone communication with arbitrarily dispersed ground sensors by improving the ground network structure. This paper aims to develop a technique titled UAV Fuzzy Travel Path' that supports UAV smooth path design and enables ground network topology shifting. A comprehensive UAV-based data collection model is proposed to enable dynamic orchestration/re-orchestration of wireless ground sensors to jointly improve network performance and UAV path fluidity. This provides a more flexible ground network framework that can be restructured based on network demands and UAV optimal paths, effectively allowing for a software-defined network concept. The main contribution of this work is the implementation of the software-defined wireless sensor network on the ground network that adaptably supports the movement of the UAV and enhances the communication network’s energy efficiency with a proposed latency analytical analysis via network orchestration/re-orchestration phases. The main significance of this research is in offering a flexible span for UAV path design than being fixed in one strict route for data gathering purposes. Four various simulation tools are employed for modelling and performance evaluation, namely MATLAB, CupCarbon, Contiki-Cooja and Mission Planner. The proposed software-defined ground network system demonstrates encouraging results in terms of network performance metrics including energy consumption of UAV versus ground sensor nodes energy usage, packet delivery rate, and the communication time of the ground orchestrated or/and re-orchestrated network.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"5 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140810072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An age of information based scheduling algorithm in a shared channel with energy and link capacity constraints 共享信道中基于信息时代的调度算法,具有能量和链路容量限制
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-29 DOI: 10.1007/s11276-024-03740-2
Wei Hao, Chen Hou

For data collection systems, it is important to rationally allocate link capacity to each source node so that the base station can receive fresh data. In recent years, a metric called age of information (AoI) has appeared to measure the freshness of the received information. In this paper, we build a model in which multiple heterogeneous source nodes with energy constraints transmit samples to a base station via a shared capacity-constrained channel. Then, with the objective of minimizing average weighted AoI in data collection systems, we propose a strategy where each source node has two buffers to store its latest partially transmitted sample and its complete latest collected sample, respectively. We establish the AoI model, sample transmission model and energy consumption model for the two buffers, and design a scheduling algorithm two-buffers strategy algorithm in this strategy. Finally, the proposed algorithm has been compared with the other four scheduling algorithms by simulation. The results show that the proposed algorithm performs better than them in terms of the average weighted AoI.

对于数据采集系统来说,合理分配每个源节点的链路容量以便基站能接收到新鲜数据是非常重要的。近年来,出现了一种称为信息年龄(AoI)的指标来衡量接收信息的新鲜程度。在本文中,我们建立了一个模型,在该模型中,多个异构源节点通过一个共享的容量受限信道向基站传输样本。然后,以最小化数据采集系统中的平均加权 AoI 为目标,我们提出了一种策略,即每个源节点都有两个缓冲区,分别用于存储最新的部分传输样本和完整的最新采集样本。我们建立了两个缓冲区的 AoI 模型、样本传输模型和能耗模型,并在此策略下设计了一种调度算法双缓冲区策略算法。最后,通过仿真将提出的算法与其他四种调度算法进行了比较。结果表明,就平均加权 AoI 而言,所提算法的性能优于它们。
{"title":"An age of information based scheduling algorithm in a shared channel with energy and link capacity constraints","authors":"Wei Hao, Chen Hou","doi":"10.1007/s11276-024-03740-2","DOIUrl":"https://doi.org/10.1007/s11276-024-03740-2","url":null,"abstract":"<p>For data collection systems, it is important to rationally allocate link capacity to each source node so that the base station can receive fresh data. In recent years, a metric called age of information (AoI) has appeared to measure the freshness of the received information. In this paper, we build a model in which multiple heterogeneous source nodes with energy constraints transmit samples to a base station via a shared capacity-constrained channel. Then, with the objective of minimizing average weighted AoI in data collection systems, we propose a strategy where each source node has two buffers to store its latest partially transmitted sample and its complete latest collected sample, respectively. We establish the AoI model, sample transmission model and energy consumption model for the two buffers, and design a scheduling algorithm two-buffers strategy algorithm in this strategy. Finally, the proposed algorithm has been compared with the other four scheduling algorithms by simulation. The results show that the proposed algorithm performs better than them in terms of the average weighted AoI.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"73 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140809860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple parameter decision for backoff counter optimization of medical body area network 优化医疗体域网络后退计数器的多参数决策
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-29 DOI: 10.1007/s11276-024-03741-1
Khushboo Dadhich, Devika Kataria

Medical Body Area Networks are emerging as remote healthcare solutions where many sensors monitor the physiological parameters of the human body and communicate the data to a central hub. In this work, the goal has been to improve the reliability of data transmission using the Carrier Sense Multiple Access with Collision Avoidance protocol used in the medium access control layer. The authors propose an algorithm for optimizing backoff counter value using a multi-parameter decision-making algorithm called Criteria Importance through Intercriteria Correlation (CRITIC). We use CRITIC for deciding the user priority and backoff counter values, to reduce collisions and improve the reliability of medical body area networks. The work has evolved into three parts, the first part being the use of CRITIC to determine the sensor node’s priority when multiple nodes with different packet sizes and data rates are ready for data transmission. The second part was to use CRITIC to compute the backoff counter value depending on node parameters. These new values have the advantage that they are dependent on the weights of various parameters associated with the sensor node and therefore minimize the waiting time. Thirdly, a Markov chain-based analytical model has been presented to obtain the expression for performance metrics such as reliability, probability of transmission, probability of channel access failure, and probability of packet drop due to maximum retransmission limit. Simulation have been done for 10 practical sensor nodes with various distinct parameters using MATLAB. The results validate that the CRITIC backoff counter value in IEEE 802.15.6 standard enhances the reliability as compared with the conventional IEEE 802.15.6 backoff counter value. The results in this work show that the probability of packet drop reduces from 0.93 to 0.49.

医用体域网是一种新兴的远程医疗解决方案,它由许多传感器监测人体的生理参数,并将数据传送到中心枢纽。在这项工作中,目标是利用介质访问控制层中使用的带碰撞避免功能的载波感应多路访问协议提高数据传输的可靠性。作者提出了一种使用多参数决策算法优化回退计数器值的算法,该算法被称为 "通过标准间相关性确定标准重要性"(CRITIC)。我们使用 CRITIC 来决定用户优先级和回退计数器值,以减少碰撞并提高医疗机构区域网络的可靠性。这项工作分为三个部分,第一部分是在多个具有不同数据包大小和数据传输速率的节点准备传输数据时,使用 CRITIC 确定传感器节点的优先级。第二部分是使用 CRITIC 根据节点参数计算后退计数器值。这些新值的优点是取决于与传感器节点相关的各种参数的权重,因此能最大限度地减少等待时间。第三,提出了一个基于马尔可夫链的分析模型,以获得可靠性、传输概率、信道接入失败概率和最大重传限制导致的数据包丢弃概率等性能指标的表达式。使用 MATLAB 对 10 个具有不同参数的实用传感器节点进行了仿真。结果验证了 IEEE 802.15.6 标准中的 CRITIC 延迟计数器值与传统的 IEEE 802.15.6 延迟计数器值相比提高了可靠性。研究结果表明,数据包丢失的概率从 0.93 降至 0.49。
{"title":"Multiple parameter decision for backoff counter optimization of medical body area network","authors":"Khushboo Dadhich, Devika Kataria","doi":"10.1007/s11276-024-03741-1","DOIUrl":"https://doi.org/10.1007/s11276-024-03741-1","url":null,"abstract":"<p>Medical Body Area Networks are emerging as remote healthcare solutions where many sensors monitor the physiological parameters of the human body and communicate the data to a central hub. In this work, the goal has been to improve the reliability of data transmission using the Carrier Sense Multiple Access with Collision Avoidance protocol used in the medium access control layer. The authors propose an algorithm for optimizing backoff counter value using a multi-parameter decision-making algorithm called Criteria Importance through Intercriteria Correlation (CRITIC). We use CRITIC for deciding the user priority and backoff counter values, to reduce collisions and improve the reliability of medical body area networks. The work has evolved into three parts, the first part being the use of CRITIC to determine the sensor node’s priority when multiple nodes with different packet sizes and data rates are ready for data transmission. The second part was to use CRITIC to compute the backoff counter value depending on node parameters. These new values have the advantage that they are dependent on the weights of various parameters associated with the sensor node and therefore minimize the waiting time. Thirdly, a Markov chain-based analytical model has been presented to obtain the expression for performance metrics such as reliability, probability of transmission, probability of channel access failure, and probability of packet drop due to maximum retransmission limit. Simulation have been done for 10 practical sensor nodes with various distinct parameters using MATLAB. The results validate that the CRITIC backoff counter value in IEEE 802.15.6 standard enhances the reliability as compared with the conventional IEEE 802.15.6 backoff counter value. The results in this work show that the probability of packet drop reduces from 0.93 to 0.49.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"1 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140810064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-criteria aware integrated decision making routing protocol for IoT communication toward 6G networks 面向 6G 网络的物联网通信多标准感知综合决策路由协议
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-20 DOI: 10.1007/s11276-024-03739-9
Valmik Tilwari, Taewon Song, Usha Nandini, V. Sivasankaran, Sangheon Pack

Energy resource limitations, data packet traffic congestion, mobility, and communication link failure of relay nodes are vital challenges in establishing a reliable and efficient path between end-to-end users in IoT Communication toward 6G. These factors can severely affect routing and network performance. Hence, it is imperative to design a routing approach to adapt to such heterogeneity to improve the quality of service (QoS) performance toward 6G networks. This paper proposes a multi-criteria-aware integrated decision-making (MCAIDeM) routing protocol in which relay nodes’ residual energy, queue length, mobility, and link quality are integrated into a single routing approach for efficient and reliable route selection. In particular, the MCAIDeM routing protocol utilizes an analytic hierarchy process (AHP) approach for multi-criteria decision-making, which determines appropriate weights according to the parameter values of the nodes to select suitable relay nodes during the route selection process. Extensive simulations are performed to evaluate the performance, and the obtained simulation results showed that the proposed MCAIDeM routing protocol outperforms conventional routing protocols in terms of network throughput, latency, and energy consumption with various network parameters. The end-to-end delay obtained by MCAIDeM was 9.03% and 11.26% lower than that of MBMQA, 11.21%, and 13.67% lower than that of MEQSA-OLSRv2, and 19.15% and 16.61% lower than that of the MP-OLSRv2 routing protocols when the node speed increased from 5 m/s to 30 m/s, respectively.

在面向 6G 的物联网通信中,能源资源限制、数据包流量拥塞、移动性和中继节点的通信链路故障是在端到端用户之间建立可靠高效路径的重要挑战。这些因素会严重影响路由和网络性能。因此,当务之急是设计一种适应这种异质性的路由方法,以提高面向 6G 网络的服务质量(QoS)性能。本文提出了一种多标准感知综合决策(MCAIDeM)路由协议,将中继节点的剩余能量、队列长度、移动性和链路质量整合到单一路由方法中,以实现高效可靠的路由选择。特别是,MCAIDeM 路由协议利用分析层次过程(AHP)方法进行多标准决策,根据节点的参数值确定适当的权重,从而在路由选择过程中选择合适的中继节点。仿真结果表明,MCAIDeM 路由协议在不同网络参数下的网络吞吐量、延迟和能耗方面均优于传统路由协议。当节点速度从5 m/s增加到30 m/s时,MCAIDeM获得的端到端延迟分别比MBMQA低9.03%和11.26%,比MEQSA-OLSRv2低11.21%和13.67%,比MP-OLSRv2路由协议低19.15%和16.61%。
{"title":"A multi-criteria aware integrated decision making routing protocol for IoT communication toward 6G networks","authors":"Valmik Tilwari, Taewon Song, Usha Nandini, V. Sivasankaran, Sangheon Pack","doi":"10.1007/s11276-024-03739-9","DOIUrl":"https://doi.org/10.1007/s11276-024-03739-9","url":null,"abstract":"<p>Energy resource limitations, data packet traffic congestion, mobility, and communication link failure of relay nodes are vital challenges in establishing a reliable and efficient path between end-to-end users in IoT Communication toward 6G. These factors can severely affect routing and network performance. Hence, it is imperative to design a routing approach to adapt to such heterogeneity to improve the quality of service (QoS) performance toward 6G networks. This paper proposes a multi-criteria-aware integrated decision-making (MCAIDeM) routing protocol in which relay nodes’ residual energy, queue length, mobility, and link quality are integrated into a single routing approach for efficient and reliable route selection. In particular, the MCAIDeM routing protocol utilizes an analytic hierarchy process (AHP) approach for multi-criteria decision-making, which determines appropriate weights according to the parameter values of the nodes to select suitable relay nodes during the route selection process. Extensive simulations are performed to evaluate the performance, and the obtained simulation results showed that the proposed MCAIDeM routing protocol outperforms conventional routing protocols in terms of network throughput, latency, and energy consumption with various network parameters. The end-to-end delay obtained by MCAIDeM was 9.03% and 11.26% lower than that of MBMQA, 11.21%, and 13.67% lower than that of MEQSA-OLSRv2, and 19.15% and 16.61% lower than that of the MP-OLSRv2 routing protocols when the node speed increased from 5 m/s to 30 m/s, respectively.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"64 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140628392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient group signature based certificate less verification scheme for vehicular ad-hoc network 基于群签名的高效车载 ad-hoc 网络证书验证方案
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-18 DOI: 10.1007/s11276-024-03709-1
S. Jayashree, S. V. N. Santhosh Kumar

Vehicular ad-hoc network (VANET) is widely applied in transportation applications to ensure safety and security during road transportation. In VANET, all the information’s are interchanged among vehicles with the available infrastructure on the roadside to form an ad-hoc network. In VANET, due to its communication in an open medium achieving the major security goals like integrity, authenticity, anonymity and traceability are the major concern. Since, there are numerous vehicles in the network generation and verification of digital signature requires high storage along with and verification time. To overcome all these issues, in this paper an Efficient group signature based certificate less verification scheme (EGSCVS) has been proposed to provide lightweight end to end authentication in the network. The proposed EGSCVS employs certificate less aggregation signature mechanism which is based on Elliptical curve cryptography to optimize the storage and reduce the overhead in terms of communication and computation during authentication process. Moreover, the proposed protocol utilizes the Random oracle model (ROM) to provide the formal security analysis. The implementation of the proposed protocol has been implemented using NS3 simulator with realistic simulation parameters. The simulation result shows that the proposed protocol improves the transmission overhead by 53.16%, computational cost by 48.75%, communication cost by 42.81%, signing delay by 55.17%, verification delay by 28.38% and aggregate verification delay by 45.35%.

车载 ad-hoc 网络(VANET)被广泛应用于交通运输领域,以确保道路运输过程中的安全和安保。在 VANET 中,车辆之间通过路边的可用基础设施交换所有信息,形成一个 ad-hoc 网络。在 VANET 中,由于通信是在开放介质中进行的,因此实现完整性、真实性、匿名性和可追溯性等主要安全目标是主要关注点。由于网络中车辆众多,数字签名的生成和验证需要大量存储空间和验证时间。为了克服所有这些问题,本文提出了一种基于证书的高效群组签名验证方案(EGSCVS),为网络提供轻量级端到端认证。所提出的 EGSCVS 采用了基于椭圆曲线加密法的证书少聚合签名机制,以优化存储并减少认证过程中的通信和计算开销。此外,提议的协议利用随机甲骨文模型(ROM)提供了正式的安全分析。我们使用 NS3 仿真器和真实的仿真参数实现了拟议协议。仿真结果表明,所提协议的传输开销降低了 53.16%,计算成本降低了 48.75%,通信成本降低了 42.81%,签名延迟降低了 55.17%,验证延迟降低了 28.38%,总验证延迟降低了 45.35%。
{"title":"An efficient group signature based certificate less verification scheme for vehicular ad-hoc network","authors":"S. Jayashree, S. V. N. Santhosh Kumar","doi":"10.1007/s11276-024-03709-1","DOIUrl":"https://doi.org/10.1007/s11276-024-03709-1","url":null,"abstract":"<p>Vehicular ad-hoc network (VANET) is widely applied in transportation applications to ensure safety and security during road transportation. In VANET, all the information’s are interchanged among vehicles with the available infrastructure on the roadside to form an ad-hoc network. In VANET, due to its communication in an open medium achieving the major security goals like integrity, authenticity, anonymity and traceability are the major concern. Since, there are numerous vehicles in the network generation and verification of digital signature requires high storage along with and verification time. To overcome all these issues, in this paper an Efficient group signature based certificate less verification scheme (EGSCVS) has been proposed to provide lightweight end to end authentication in the network. The proposed EGSCVS employs certificate less aggregation signature mechanism which is based on Elliptical curve cryptography to optimize the storage and reduce the overhead in terms of communication and computation during authentication process. Moreover, the proposed protocol utilizes the Random oracle model (ROM) to provide the formal security analysis. The implementation of the proposed protocol has been implemented using NS3 simulator with realistic simulation parameters. The simulation result shows that the proposed protocol improves the transmission overhead by 53.16%, computational cost by 48.75%, communication cost by 42.81%, signing delay by 55.17%, verification delay by 28.38% and aggregate verification delay by 45.35%.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"166 1-2 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140612639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An analytical approach for modelling unmanned aerial vehicles and base station interaction for disaster recovery scenarios 模拟灾后恢复场景中无人驾驶飞行器与基站互动的分析方法
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-18 DOI: 10.1007/s11276-024-03734-0
Eugene Casmin, Enver Ever

Unmanned Aerial Vehicles (UAVs) are an emerging technology with the potential to be used in various sectors for various applications and services. In wireless networking, UAVs can be used as a vital part of the supplementary infrastructure to improve coverage, principally during public safety emergencies. Because of their affordability and potential for widespread deployment, there has been a growing interest in exploring the ways in which UAVs can enhance the services offered to isolated ground devices. Large areas may lose cellular coverage following a public safety emergency that impacts critical communication infrastructure. This prompts the need for the employment of D2D communication frameworks as a complement. In such critical conditions, timely response and network connectivity are essential factors for reliable communication. This study focuses on the mathematical models of UAV-based wireless communication in the context of disaster recovery. Particularly, we aim to model a queuing framework comprising UAVs as mobile relay nodes between the stranded user devices and neighbouring operational base stations. We present an iterative solution with a novel method for generating initial conditions for the two-stage queuing model. The approximate approach presented is validated for its accuracy using discrete-event simulation. The effects of various factors on performance measures are also analysed in detail. The validation results show that the discrepancy between the analytical approach and the simulation is less than 5%, which is the confidence interval of the simulation.

无人驾驶飞行器(UAV)是一种新兴技术,有可能被用于各行各业的各种应用和服务。在无线网络领域,无人飞行器可作为辅助基础设施的重要组成部分,主要在公共安全紧急情况下改善覆盖范围。由于无人机价格低廉,具有广泛部署的潜力,人们对探索无人机如何增强为孤立的地面设备提供的服务越来越感兴趣。在发生影响关键通信基础设施的公共安全突发事件后,大片地区可能会失去蜂窝网络覆盖。这就需要使用 D2D 通信框架作为补充。在这种危急情况下,及时响应和网络连接是实现可靠通信的关键因素。本研究侧重于灾后恢复背景下基于无人机的无线通信数学模型。特别是,我们旨在建立一个队列框架模型,该框架由无人机组成,是受困用户设备与邻近运行基站之间的移动中继节点。我们提出了一种迭代解决方案,采用新颖的方法为两阶段队列模型生成初始条件。我们利用离散事件仿真验证了所提出的近似方法的准确性。此外,还详细分析了各种因素对性能指标的影响。验证结果表明,分析方法与模拟结果之间的差异小于 5%,即模拟结果的置信区间。
{"title":"An analytical approach for modelling unmanned aerial vehicles and base station interaction for disaster recovery scenarios","authors":"Eugene Casmin, Enver Ever","doi":"10.1007/s11276-024-03734-0","DOIUrl":"https://doi.org/10.1007/s11276-024-03734-0","url":null,"abstract":"<p>Unmanned Aerial Vehicles (UAVs) are an emerging technology with the potential to be used in various sectors for various applications and services. In wireless networking, UAVs can be used as a vital part of the supplementary infrastructure to improve coverage, principally during public safety emergencies. Because of their affordability and potential for widespread deployment, there has been a growing interest in exploring the ways in which UAVs can enhance the services offered to isolated ground devices. Large areas may lose cellular coverage following a public safety emergency that impacts critical communication infrastructure. This prompts the need for the employment of D2D communication frameworks as a complement. In such critical conditions, timely response and network connectivity are essential factors for reliable communication. This study focuses on the mathematical models of UAV-based wireless communication in the context of disaster recovery. Particularly, we aim to model a queuing framework comprising UAVs as mobile relay nodes between the stranded user devices and neighbouring operational base stations. We present an iterative solution with a novel method for generating initial conditions for the two-stage queuing model. The approximate approach presented is validated for its accuracy using discrete-event simulation. The effects of various factors on performance measures are also analysed in detail. The validation results show that the discrepancy between the analytical approach and the simulation is less than 5%, which is the confidence interval of the simulation.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"1 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140628388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Wireless Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1