首页 > 最新文献

Wireless Networks最新文献

英文 中文
Scheduling periodic sensors for instantaneous aggregated traffic minimization 调度周期性传感器,实现瞬时聚合流量最小化
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-17 DOI: 10.1007/s11276-024-03722-4
Sunanda Bose, Akash Chowdhury, Nandini Mukherjee

In IoT paradigm, Sensor-Cloud Infrastructure provides sensor nodes that sense various environmental parameters, generates the data and sends the same to the desired destination, say a cloud server through a common gateway. Sensor nodes with different data streaming specifications, can generate huge amount of traffic, if streams data simultaneously towards the destination, according to a random schedule. This can lead to higher bandwidth requirements in the wireless medium and increase the amount of data to be received at the gateway in any time slot. This further increases the channel capacity required at the access link to transmit the received data from gateway to the server. An optimal schedule of the sensor nodes will lead to minimization of instantaneous aggregated traffic in both the wireless medium and the access link. Thus leading to minimization of required bandwidth at the wireless medium and channel capacity at the access link. This would further increase the resource utilization of minimize the service provisioning cost of the sensor-cloud infrastructure. A straight forward optimization of the problem of minimizing the instantaneous aggregated traffic load generated from n sensor nodes require an exponential time to find the optimal schedule. Thus, in this paper, an ILP formulation and a polynomial-time heuristic algorithm is presented.

在物联网范例中,传感器-云基础设施提供传感器节点,这些节点可感知各种环境参数,生成数据并通过普通网关将数据发送到所需的目的地,例如云服务器。具有不同数据流规格的传感器节点,如果按照随机时间表同时向目的地发送数据流,就会产生巨大的流量。这可能会导致无线介质的带宽要求更高,并增加网关在任何时隙内接收的数据量。这进一步增加了接入链路将接收到的数据从网关传输到服务器所需的信道容量。传感器节点的最佳调度将导致无线介质和接入链路中的瞬时聚合流量最小化。从而使无线介质所需的带宽和接入链路的信道容量最小化。这将进一步提高资源利用率,最大限度地降低传感器云基础设施的服务供应成本。要直接优化 n 个传感器节点产生的瞬时聚合流量负载最小化问题,需要指数级的时间才能找到最佳时间表。因此,本文提出了一个 ILP 公式和一种多项式时间启发式算法。
{"title":"Scheduling periodic sensors for instantaneous aggregated traffic minimization","authors":"Sunanda Bose, Akash Chowdhury, Nandini Mukherjee","doi":"10.1007/s11276-024-03722-4","DOIUrl":"https://doi.org/10.1007/s11276-024-03722-4","url":null,"abstract":"<p>In IoT paradigm, Sensor-Cloud Infrastructure provides sensor nodes that sense various environmental parameters, generates the data and sends the same to the desired destination, say a cloud server through a common gateway. Sensor nodes with different data streaming specifications, can generate huge amount of traffic, if streams data simultaneously towards the destination, according to a random schedule. This can lead to higher bandwidth requirements in the wireless medium and increase the amount of data to be received at the gateway in any time slot. This further increases the channel capacity required at the access link to transmit the received data from gateway to the server. An optimal schedule of the sensor nodes will lead to minimization of instantaneous aggregated traffic in both the wireless medium and the access link. Thus leading to minimization of required bandwidth at the wireless medium and channel capacity at the access link. This would further increase the resource utilization of minimize the service provisioning cost of the sensor-cloud infrastructure. A straight forward optimization of the problem of minimizing the instantaneous aggregated traffic load generated from n sensor nodes require an exponential time to find the optimal schedule. Thus, in this paper, an ILP formulation and a polynomial-time heuristic algorithm is presented.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"144 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140612752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Queue stability and dynamic throughput maximization in multi-agent heterogeneous wireless networks 多代理异构无线网络中的队列稳定性和动态吞吐量最大化
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-13 DOI: 10.1007/s11276-024-03730-4
Ting Yang, Jiabao Sun, Amin Mohajer

The Industrial Internet of Things (IIoT) envisions enhanced surveillance and control for industrial applications through diverse IoT devices. However, the increasing heterogeneity of deployed end devices poses challenges to current practices, hampering overall performance as device numbers escalate. To tackle this issue, we introduce an innovative distributed power control algorithm leveraging the wireless channel's nature to approximate the centralized maximum-weight scheduling algorithm. Employing ubiquitous multi-protocol mobile devices as intermediaries, we propose a concurrent dual-hop/multi-hop backhauling strategy, improving interoperability and facilitating data relay, translation, and forwarding from end IoT devices. Our focus is directed towards addressing large-scale network stability and queue management challenges. We formulate a long-term time-averaged optimization problem, incorporating considerations of end-to-end rate control, routing, link scheduling, and resource allocation to guarantee essential network-wide throughput. Furthermore, we present a real-time decomposition-based approximation algorithm that ensures adaptive resource allocation, queue stability, and meeting Quality of Service (QoS) constraints with the highest energy efficiency. Comprehensive numerical results verify significant energy efficiency improvements across diverse traffic models, maintaining throughput requirements for both uniform and hotspot User Equipment (UE) distribution patterns. This work offers a comprehensive solution to enhance IIoT performance and address evolving challenges in industrial applications.

工业物联网(IIoT)的设想是通过各种物联网设备加强对工业应用的监控。然而,部署的终端设备的异构性越来越高,这给当前的做法带来了挑战,随着设备数量的增加,整体性能也会受到影响。为解决这一问题,我们引入了一种创新的分布式功率控制算法,利用无线信道的特性来近似集中式最大权重调度算法。利用无处不在的多协议移动设备作为中介,我们提出了一种并发双跳/多跳回程策略,从而提高了互操作性,促进了终端物联网设备的数据中继、转换和转发。我们的重点是解决大规模网络稳定性和队列管理难题。我们提出了一个长期时间平均优化问题,将端到端速率控制、路由、链路调度和资源分配等因素纳入考虑范围,以保证整个网络的基本吞吐量。此外,我们还提出了一种基于实时分解的近似算法,可确保自适应资源分配、队列稳定性,并以最高能效满足服务质量(QoS)约束。全面的数值结果验证了在各种流量模型中能源效率的显著提高,同时保持了统一和热点用户设备(UE)分布模式的吞吐量要求。这项工作提供了一个全面的解决方案,以提高物联网性能,应对工业应用中不断变化的挑战。
{"title":"Queue stability and dynamic throughput maximization in multi-agent heterogeneous wireless networks","authors":"Ting Yang, Jiabao Sun, Amin Mohajer","doi":"10.1007/s11276-024-03730-4","DOIUrl":"https://doi.org/10.1007/s11276-024-03730-4","url":null,"abstract":"<p>The Industrial Internet of Things (IIoT) envisions enhanced surveillance and control for industrial applications through diverse IoT devices. However, the increasing heterogeneity of deployed end devices poses challenges to current practices, hampering overall performance as device numbers escalate. To tackle this issue, we introduce an innovative distributed power control algorithm leveraging the wireless channel's nature to approximate the centralized maximum-weight scheduling algorithm. Employing ubiquitous multi-protocol mobile devices as intermediaries, we propose a concurrent dual-hop/multi-hop backhauling strategy, improving interoperability and facilitating data relay, translation, and forwarding from end IoT devices. Our focus is directed towards addressing large-scale network stability and queue management challenges. We formulate a long-term time-averaged optimization problem, incorporating considerations of end-to-end rate control, routing, link scheduling, and resource allocation to guarantee essential network-wide throughput. Furthermore, we present a real-time decomposition-based approximation algorithm that ensures adaptive resource allocation, queue stability, and meeting Quality of Service (QoS) constraints with the highest energy efficiency. Comprehensive numerical results verify significant energy efficiency improvements across diverse traffic models, maintaining throughput requirements for both uniform and hotspot User Equipment (UE) distribution patterns. This work offers a comprehensive solution to enhance IIoT performance and address evolving challenges in industrial applications.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"159 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol SAIF-Cnet:基于去中心化区块链密钥管理协议的自注意改进型更快卷积神经网络
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-13 DOI: 10.1007/s11276-024-03728-y
N. R. Rejin Paul, P. Purnendu Shekhar, Charanjeet Singh, P. Rajesh Kumar

Internet of Things (IoT) devices are an essential part of several aspects of daily life for people. They are utilized in a variety of contexts, including industrial monitoring, environmental sensing, and so on. But, secure communication is the major challenge in the IoT environment. Therefore, a decentralized Blockchain-based Key Management protocol using Levy Flight-Equilibrium Optimization and Self-Attention-based Improved Faster Region-based Convolutional Neural Network (BlkKM) method is proposed to determine stable security in tamper-resistant hardware machine that can protect sensitive secret data in the healthcare field i.e., stored cryptographic keys. The keys are categorized as Key Encryption Keys (KEKs) and Data Encryption Keys (DEKs). The number of the keys is decreased by using Levy Flight- Equilibrium Optimization (LF-EO) as organizing nodes with logical sets. Also, Self-Attention-based Improved Faster Region-based Convolutional Neural Network (SA-based IFRCNN) is used for reordering a set of logical nodes to minimize the number of sets after a node exits the network. Additionally, the system makes use of smart contracts for access control as well as proxy encryption to data encryption. The proposed method is compared with existing techniques to validate the security enhancement performance. The evaluation is performed based on throughput, end-to-end delay, storage overheads, and energy consumption. The experimentation results revealed that the proposed method improved the throughput to 220.52bps and diminished the utilization of energy. A greater degree of memory usage is also decreased by using this technique.

物联网(IoT)设备是人们日常生活中不可或缺的一部分。它们被用于各种场合,包括工业监控、环境传感等。但是,安全通信是物联网环境中的主要挑战。因此,本文提出了一种基于区块链的去中心化密钥管理协议,该协议采用列维飞行平衡优化和基于自注意力的改进型快速区域卷积神经网络(BlkKM)方法,以确定防篡改硬件机器的稳定安全性,从而保护医疗保健领域的敏感机密数据,即存储的加密密钥。密钥分为密钥加密密钥(KEK)和数据加密密钥(DEK)。使用 Levy Flight- Equilibrium Optimization(LF-EO)作为逻辑集的组织节点,可以减少密钥的数量。此外,还使用基于自注意的改进型快速区域卷积神经网络(SA-based IFRCNN)对逻辑节点集重新排序,以尽量减少节点退出网络后的节点集数量。此外,该系统还利用智能合约进行访问控制,并使用代理加密技术进行数据加密。我们将所提出的方法与现有技术进行了比较,以验证其安全增强性能。评估基于吞吐量、端到端延迟、存储开销和能耗。实验结果表明,所提出的方法将吞吐量提高到了 220.52bps,并降低了能量消耗。通过使用这种技术,还在更大程度上减少了内存的使用。
{"title":"SAIF-Cnet: self-attention improved faster convolutional neural network for decentralized blockchain-based key management protocol","authors":"N. R. Rejin Paul, P. Purnendu Shekhar, Charanjeet Singh, P. Rajesh Kumar","doi":"10.1007/s11276-024-03728-y","DOIUrl":"https://doi.org/10.1007/s11276-024-03728-y","url":null,"abstract":"<p>Internet of Things (IoT) devices are an essential part of several aspects of daily life for people. They are utilized in a variety of contexts, including industrial monitoring, environmental sensing, and so on. But, secure communication is the major challenge in the IoT environment. Therefore, a decentralized Blockchain-based Key Management protocol using Levy Flight-Equilibrium Optimization and Self-Attention-based Improved Faster Region-based Convolutional Neural Network (BlkKM) method is proposed to determine stable security in tamper-resistant hardware machine that can protect sensitive secret data in the healthcare field i.e., stored cryptographic keys. The keys are categorized as Key Encryption Keys (KEKs) and Data Encryption Keys (DEKs). The number of the keys is decreased by using Levy Flight- Equilibrium Optimization (LF-EO) as organizing nodes with logical sets. Also, Self-Attention-based Improved Faster Region-based Convolutional Neural Network (SA-based IFRCNN) is used for reordering a set of logical nodes to minimize the number of sets after a node exits the network. Additionally, the system makes use of smart contracts for access control as well as proxy encryption to data encryption. The proposed method is compared with existing techniques to validate the security enhancement performance. The evaluation is performed based on throughput, end-to-end delay, storage overheads, and energy consumption. The experimentation results revealed that the proposed method improved the throughput to 220.52bps and diminished the utilization of energy. A greater degree of memory usage is also decreased by using this technique.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"296 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent reflecting surface-aided computation offloading in UAV-enabled edge networks 无人机支持的边缘网络中的智能反射面辅助计算卸载
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-12 DOI: 10.1007/s11276-024-03731-3
Wenyu Luo, Huajun Cui, Xuefeng Xian, Xiaoming He

The popularity of wireless communication technology and smart devices make emerging tasks tend to be computationally intensive. Unfortunately, mobile devices are often computationally resource-constrained. Mobile edge computing is proposed to offer computing power for these resource-limited devices to solve the computing requirement of their tasks. The unmanned aerial vehicle (UAV) enabled edge networks are flexible and low-cost, so they are considered to provide more flexible computing service for mobile devices. However, UAV-enabled edge networks are limited by the weak wireless propagation environment. To this end, we introduce intelligent reflecting surface (IRS) into the UAV-enabled edge networks in which IRS is used to construct a stronger link between the mobile devices and the UAV for task offloading. We formulate the IRS-aided offloading problem as an optimization problem to optimize the overall delay by jointly optimizing UAV movement, offloading decision, IRS configuration, and UAV’s computation resource. To solve the problem more efficiently, we use the deep reinforcement learning (DRL) model to explore the intelligent action that can minimize the task processing time. Our simulation demonstrates the DRL scheme is more effective compared with the benchmarks.

无线通信技术和智能设备的普及使新兴任务趋向于计算密集型。遗憾的是,移动设备的计算资源往往有限。移动边缘计算的提出就是要为这些资源有限的设备提供计算能力,以解决其任务的计算需求。无人机(UAV)支持的边缘网络具有灵活性和低成本的特点,因此被认为能为移动设备提供更灵活的计算服务。然而,无人飞行器支持的边缘网络受到弱无线传播环境的限制。为此,我们在无人机边缘网络中引入了智能反射面(IRS),利用 IRS 在移动设备和无人机之间构建更强的链接,以实现任务卸载。我们将 IRS 辅助卸载问题表述为一个优化问题,通过联合优化无人机移动、卸载决策、IRS 配置和无人机计算资源来优化整体延迟。为了更有效地解决这个问题,我们使用了深度强化学习(DRL)模型来探索能使任务处理时间最小化的智能行动。我们的仿真表明,与基准相比,DRL 方案更加有效。
{"title":"Intelligent reflecting surface-aided computation offloading in UAV-enabled edge networks","authors":"Wenyu Luo, Huajun Cui, Xuefeng Xian, Xiaoming He","doi":"10.1007/s11276-024-03731-3","DOIUrl":"https://doi.org/10.1007/s11276-024-03731-3","url":null,"abstract":"<p>The popularity of wireless communication technology and smart devices make emerging tasks tend to be computationally intensive. Unfortunately, mobile devices are often computationally resource-constrained. Mobile edge computing is proposed to offer computing power for these resource-limited devices to solve the computing requirement of their tasks. The unmanned aerial vehicle (UAV) enabled edge networks are flexible and low-cost, so they are considered to provide more flexible computing service for mobile devices. However, UAV-enabled edge networks are limited by the weak wireless propagation environment. To this end, we introduce intelligent reflecting surface (IRS) into the UAV-enabled edge networks in which IRS is used to construct a stronger link between the mobile devices and the UAV for task offloading. We formulate the IRS-aided offloading problem as an optimization problem to optimize the overall delay by jointly optimizing UAV movement, offloading decision, IRS configuration, and UAV’s computation resource. To solve the problem more efficiently, we use the deep reinforcement learning (DRL) model to explore the intelligent action that can minimize the task processing time. Our simulation demonstrates the DRL scheme is more effective compared with the benchmarks.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"46 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on routing and load-balancing mechanisms in software-defined vehicular networks 软件定义的车载网络中的路由和负载平衡机制调查
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-10 DOI: 10.1007/s11276-024-03729-x
Madhuri Malakar, Judhistir Mahapatro, Timam Ghosh

Software-defined vehicular networks (SDVN) is a promising technology for wireless data transmissions between vehicles. SDVN inherits software-defined networking principles and aims to improve the typical performance of safety and non-safety applications of vehicular adhoc networks. Consequently, enhancing the performance of Intelligent Transportation System (ITS). However, the performance of these ITS applications largely depends on the computational capability of the controller node, which involves creating or destroying a data path from the source vehicle to the destination vehicle and generating flow rules for the requests coming from the data plane elements. As a result, SDVN often suffers from the problems of overburdening the controller node with route requests under heavy traffic generation at vehicles and single-point controller failure. To counter these problems, solutions based on multiple controllers are proposed. In fact, the load-balancing problem remains an important issue. So, routing of data with multiple controllers and load-balancing, both topics in SDVN, go hand in hand. In this paper, we survey this state-of-the-art that discusses the above-mentioned challenges, starting with the SDVN preliminaries. We scrutinize the existing routing methodologies and also discuss load-balancing techniques. Furthermore, we provide real-time applications and services of SDVN, discuss trending research, potential future research directions, and the real-life applicability of SDVN that have not been addressed previously.

软件定义的车载网络(SDVN)是一种很有前途的车辆间无线数据传输技术。SDVN 继承了软件定义网络的原则,旨在提高车辆特设网络安全和非安全应用的典型性能。从而提高智能交通系统(ITS)的性能。然而,这些智能交通系统应用的性能在很大程度上取决于控制器节点的计算能力,其中涉及创建或销毁从源车辆到目的地车辆的数据路径,以及为来自数据平面元素的请求生成流规则。因此,SDVN 经常出现车辆产生大量流量时路由请求使控制器节点负担过重以及控制器单点故障等问题。为了解决这些问题,人们提出了基于多控制器的解决方案。事实上,负载平衡问题仍然是一个重要问题。因此,多控制器数据路由和负载平衡这两个 SDVN 的主题是相辅相成的。在本文中,我们从 SDVN 的基本原理入手,调查了讨论上述挑战的最新进展。我们仔细研究了现有的路由选择方法,并讨论了负载平衡技术。此外,我们还提供了 SDVN 的实时应用和服务,讨论了趋势研究、潜在的未来研究方向以及 SDVN 在现实生活中的适用性,这些都是以前未曾讨论过的。
{"title":"A survey on routing and load-balancing mechanisms in software-defined vehicular networks","authors":"Madhuri Malakar, Judhistir Mahapatro, Timam Ghosh","doi":"10.1007/s11276-024-03729-x","DOIUrl":"https://doi.org/10.1007/s11276-024-03729-x","url":null,"abstract":"<p>Software-defined vehicular networks (SDVN) is a promising technology for wireless data transmissions between vehicles. SDVN inherits software-defined networking principles and aims to improve the typical performance of safety and non-safety applications of vehicular adhoc networks. Consequently, enhancing the performance of Intelligent Transportation System (ITS). However, the performance of these ITS applications largely depends on the computational capability of the controller node, which involves creating or destroying a data path from the source vehicle to the destination vehicle and generating flow rules for the requests coming from the data plane elements. As a result, SDVN often suffers from the problems of overburdening the controller node with route requests under heavy traffic generation at vehicles and single-point controller failure. To counter these problems, solutions based on multiple controllers are proposed. In fact, the load-balancing problem remains an important issue. So, routing of data with multiple controllers and load-balancing, both topics in SDVN, go hand in hand. In this paper, we survey this state-of-the-art that discusses the above-mentioned challenges, starting with the SDVN preliminaries. We scrutinize the existing routing methodologies and also discuss load-balancing techniques. Furthermore, we provide real-time applications and services of SDVN, discuss trending research, potential future research directions, and the real-life applicability of SDVN that have not been addressed previously.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"45 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer vision-driven forest wildfire and smoke recognition via IoT drone cameras 通过物联网无人机摄像头进行计算机视觉驱动的森林野火和烟雾识别
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-10 DOI: 10.1007/s11276-024-03718-0
Yupeng Wang, Yongli Wang, Can Xu, Xiaoli Wang, Yong Zhang

Forest wildfires often lead to significant casualties and economic losses, making early detection crucial for prevention and control. Internet of Things connected cameras mounted on drone provide wide monitoring coverage and flexibility, while computer vision technology enhances the accuracy and response time of forest wildfire monitoring. However, the small-scale nature of early wildfire targets and the complexity of the forest environment pose significant challenges to accurately and promptly identify fires. To address challenges such as high false-positive rates and inefficiency in existing methods, we propose a Forest Wildfire and Smoke Recognition Network termed FWSRNet. Firstly, we adopt Vision Transformer, which has shown superior performance in recent traditional classification tasks, as the backbone network. Secondly, to enhance the extraction of subtle differential features, we introduce a self-attention mechanism to guide the network in selecting discriminative image patches and calculating their relationships. Next, we employ a contrastive feature learning strategy to eliminate redundant information, making the model more discriminative. Finally, we construct a target loss function for model prediction. Under various proportions of training and testing dataset allocations, the model exhibits recognition accuracies of 94.82, 95.05, 94.90, and 94.80% for forest fires. The average accuracy of 94.89% surpasses five comparative models, demonstrating the potential of this method in IoT-enhanced aerial forest fire recognition.

森林野火往往会导致重大人员伤亡和经济损失,因此早期发现对于预防和控制至关重要。安装在无人机上的物联网相机可提供广泛的监测覆盖面和灵活性,而计算机视觉技术则可提高森林野火监测的准确性和响应速度。然而,早期野火目标的小规模性和森林环境的复杂性给准确、及时地识别火情带来了巨大挑战。为了解决现有方法假阳性率高、效率低等难题,我们提出了一种森林野火和烟雾识别网络(FWSRNet)。首先,我们采用了在近期传统分类任务中表现优异的 Vision Transformer 作为骨干网络。其次,为了加强对细微差别特征的提取,我们引入了一种自我注意机制,以指导网络选择具有辨别力的图像斑块并计算它们之间的关系。接下来,我们采用对比特征学习策略来消除冗余信息,从而使模型更具区分度。最后,我们构建了用于模型预测的目标损失函数。在不同比例的训练和测试数据集分配下,模型对森林火灾的识别准确率分别为 94.82%、95.05%、94.90% 和 94.80%。94.89% 的平均准确率超过了五个比较模型,证明了该方法在物联网增强型空中林火识别中的潜力。
{"title":"Computer vision-driven forest wildfire and smoke recognition via IoT drone cameras","authors":"Yupeng Wang, Yongli Wang, Can Xu, Xiaoli Wang, Yong Zhang","doi":"10.1007/s11276-024-03718-0","DOIUrl":"https://doi.org/10.1007/s11276-024-03718-0","url":null,"abstract":"<p>Forest wildfires often lead to significant casualties and economic losses, making early detection crucial for prevention and control. Internet of Things connected cameras mounted on drone provide wide monitoring coverage and flexibility, while computer vision technology enhances the accuracy and response time of forest wildfire monitoring. However, the small-scale nature of early wildfire targets and the complexity of the forest environment pose significant challenges to accurately and promptly identify fires. To address challenges such as high false-positive rates and inefficiency in existing methods, we propose a Forest Wildfire and Smoke Recognition Network termed FWSRNet. Firstly, we adopt Vision Transformer, which has shown superior performance in recent traditional classification tasks, as the backbone network. Secondly, to enhance the extraction of subtle differential features, we introduce a self-attention mechanism to guide the network in selecting discriminative image patches and calculating their relationships. Next, we employ a contrastive feature learning strategy to eliminate redundant information, making the model more discriminative. Finally, we construct a target loss function for model prediction. Under various proportions of training and testing dataset allocations, the model exhibits recognition accuracies of 94.82, 95.05, 94.90, and 94.80% for forest fires. The average accuracy of 94.89% surpasses five comparative models, demonstrating the potential of this method in IoT-enhanced aerial forest fire recognition.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"32 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A highly effective algorithm for mitigating and identifying congestion through continuous monitoring of IoT networks, improving energy consumption 通过对物联网网络的持续监控,缓解和识别拥塞的高效算法,改善能源消耗
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-09 DOI: 10.1007/s11276-024-03727-z
Radwan S. Abujassar

The Internet of Things (IoT) consists of non-standardized computer devices that can create wireless network connections to send data. These devices have limited storage, bandwidth, and computing capacities, which may cause network congestion when nodes move or leave their allotted area. IoT networks need congestion control to enhance the efficiency of data transfer. The study examines IoT congestion and proposes using alternate nodes to maintain dataflow and quality of service (QoS). The study presents RAoNC, a novel algorithm designed to improve routing algorithms in network clusters for the purposes of congestion monitoring, avoidance, and mitigation. Congestion management techniques efficiently process network information update query packets and reduce large-header handshaking packets. Improve network performance by reducing congestion, packet loss, and throughput. The proposed method speeds up packet transfer to reduce network node packet transmission delays. The optimization approach minimizes power usage across all network nodes. We assessed the efficacy of our approach by comparative analysis utilizing NS2 simulations and contrasted the suggested algorithm with prior studies. The simulation shows that RAoNC significantly improves congestion performance. We will assess the novel RAoNC algorithm in relation to DCCC6, LEACH, and QU-RPL. The throughput increased by 28.36%, weighted fairness index by 28.2%, end-to-end delay by 48.7%, energy consumption by 31.97%, and the number of missed packets in the buffer decreased by 90.35%.

物联网(IoT)由可创建无线网络连接发送数据的非标准化计算机设备组成。这些设备的存储、带宽和计算能力有限,当节点移动或离开其分配区域时,可能会造成网络拥塞。物联网网络需要拥塞控制来提高数据传输效率。本研究探讨了物联网拥塞问题,并建议使用备用节点来维持数据流和服务质量(QoS)。研究提出了 RAoNC,这是一种新颖的算法,旨在改进网络集群中的路由算法,以达到监控、避免和缓解拥塞的目的。拥塞管理技术能有效处理网络信息更新查询数据包,减少大标题握手数据包。通过减少拥塞、数据包丢失和吞吐量来提高网络性能。建议的方法可加快数据包传输速度,减少网络节点数据包传输延迟。优化方法可最大限度地降低所有网络节点的功耗。我们利用 NS2 仿真进行了比较分析,评估了我们方法的功效,并将建议的算法与之前的研究进行了对比。模拟结果表明,RAoNC 能显著提高拥塞性能。我们将结合 DCCC6、LEACH 和 QU-RPL 对新型 RAoNC 算法进行评估。其吞吐量提高了 28.36%,加权公平指数提高了 28.2%,端到端延迟降低了 48.7%,能耗降低了 31.97%,缓冲区中遗漏的数据包数量降低了 90.35%。
{"title":"A highly effective algorithm for mitigating and identifying congestion through continuous monitoring of IoT networks, improving energy consumption","authors":"Radwan S. Abujassar","doi":"10.1007/s11276-024-03727-z","DOIUrl":"https://doi.org/10.1007/s11276-024-03727-z","url":null,"abstract":"<p>The Internet of Things (IoT) consists of non-standardized computer devices that can create wireless network connections to send data. These devices have limited storage, bandwidth, and computing capacities, which may cause network congestion when nodes move or leave their allotted area. IoT networks need congestion control to enhance the efficiency of data transfer. The study examines IoT congestion and proposes using alternate nodes to maintain dataflow and quality of service (QoS). The study presents RAoNC, a novel algorithm designed to improve routing algorithms in network clusters for the purposes of congestion monitoring, avoidance, and mitigation. Congestion management techniques efficiently process network information update query packets and reduce large-header handshaking packets. Improve network performance by reducing congestion, packet loss, and throughput. The proposed method speeds up packet transfer to reduce network node packet transmission delays. The optimization approach minimizes power usage across all network nodes. We assessed the efficacy of our approach by comparative analysis utilizing NS2 simulations and contrasted the suggested algorithm with prior studies. The simulation shows that RAoNC significantly improves congestion performance. We will assess the novel RAoNC algorithm in relation to DCCC6, LEACH, and QU-RPL. The throughput increased by 28.36%, weighted fairness index by 28.2%, end-to-end delay by 48.7%, energy consumption by 31.97%, and the number of missed packets in the buffer decreased by 90.35%.\u0000</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"105 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140602342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective Grey Wolf Optimization based self configuring wireless sensor network 基于多目标灰狼优化的自配置无线传感器网络
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-08 DOI: 10.1007/s11276-024-03732-2
A. D. C. Navin Dhinnesh, T. Sabapathi

Wireless Sensor Networks are essential for monitoring physical objects in smart systems powered by the Internet of Things. It gathers information by detecting the surroundings and transmits it to a central repository. In this study, an unknown domain was explored using multi-objective optimization. This proposed work employs Multi-objective Grey Wolf Optimization to form effective clustering among nodes and also for choosing the cluster head. Based on the multi-objective fitness function, the cluster heads are selected. For every iteration, the cluster heads are changed thereby saving the consumption of energy and also resulting in an increase in network lifespan. The suggested method divides the network into various optimal-sized clusters and chooses the best cluster heads. The performance of the multi-objective exploration is presented. The proposed method`s key contributions are by utilizing MOGWO for efficient clustering and CH selection, ultimately enhancing network performance. It dynamically adjusts CHs, resulting in energy savings and an extended network lifespan. MOGWO takes into account multiple objectives simultaneously. Through network configuration optimization, MOGWO enhances resource utilization, resulting in lower energy consumption, extended network lifetime, and improved overall efficiency.

无线传感器网络对于监控物联网智能系统中的物理对象至关重要。它通过检测周围环境来收集信息,并将其传输到中央存储库。本研究利用多目标优化技术探索了一个未知领域。本作品采用多目标灰狼优化法在节点间形成有效的聚类,并选择簇头。根据多目标拟合函数选择簇头。每次迭代都会更换簇头,从而节省能量消耗并延长网络寿命。所建议的方法将网络划分为各种最佳规模的簇,并选择最佳簇头。介绍了多目标探索的性能。建议方法的主要贡献在于利用 MOGWO 进行高效聚类和 CH 选择,最终提高网络性能。它能动态调整 CH,从而节省能量并延长网络寿命。MOGWO 同时考虑了多个目标。通过网络配置优化,MOGWO 提高了资源利用率,从而降低了能耗,延长了网络寿命,提高了整体效率。
{"title":"Multi-objective Grey Wolf Optimization based self configuring wireless sensor network","authors":"A. D. C. Navin Dhinnesh, T. Sabapathi","doi":"10.1007/s11276-024-03732-2","DOIUrl":"https://doi.org/10.1007/s11276-024-03732-2","url":null,"abstract":"<p>Wireless Sensor Networks are essential for monitoring physical objects in smart systems powered by the Internet of Things. It gathers information by detecting the surroundings and transmits it to a central repository. In this study, an unknown domain was explored using multi-objective optimization. This proposed work employs Multi-objective Grey Wolf Optimization to form effective clustering among nodes and also for choosing the cluster head. Based on the multi-objective fitness function, the cluster heads are selected. For every iteration, the cluster heads are changed thereby saving the consumption of energy and also resulting in an increase in network lifespan. The suggested method divides the network into various optimal-sized clusters and chooses the best cluster heads. The performance of the multi-objective exploration is presented. The proposed method`s key contributions are by utilizing MOGWO for efficient clustering and CH selection, ultimately enhancing network performance. It dynamically adjusts CHs, resulting in energy savings and an extended network lifespan. MOGWO takes into account multiple objectives simultaneously. Through network configuration optimization, MOGWO enhances resource utilization, resulting in lower energy consumption, extended network lifetime, and improved overall efficiency.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"159 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Genetically optimized TD3 algorithm for efficient access control in the internet of vehicles 用于车联网高效访问控制的基因优化 TD3 算法
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-08 DOI: 10.1007/s11276-024-03733-1
Abdullah A. Al-Atawi

The Internet of Vehicles (IoV) is currently experiencing significant development, which has involved the introduction of an efficient Access Control Mechanism (ACM). Reliable access control is evolving into mandatory in order to provide security and efficient transmission within the IoV environment as the volume of vehicles equipped with connectivity continues to expand and they become more incorporated into any number of applications. The primary objective of this research is to develop an ACM for the IoV system based on the use of a Genetically Optimized Twin-Delayed Delayed Deep Deterministic Policy Gradient (TD3) algorithm. The TD3 model modifies access policies to be in line with the current scenario using deep reinforcement learning (Deep RL) techniques. This allows vehicles to make access decisions that are intelligent about the environment in which they are performing. To prevent energy loss while the vehicle is in transit into the client system, the model also emphasizes access based on the vehicle's energy consumption (EC). Finally, with the support of the genetic algorithm (GA), the accuracy of the access control model can be improved by optimizing the high-level parameters in a manner in which they improves efficiency. In order to further enhance the model's environmental sustainability and reliability, the recommended model provides an approach that is both profound and efficient for access control in the constantly changing setting of the IoV.

车联网(IoV)目前正经历着重大发展,其中涉及引入高效的访问控制机制(ACM)。为了在 IoV 环境中提供安全和高效的传输,可靠的访问控制正逐渐成为强制性的,因为配备连接功能的车辆数量在不断扩大,而且它们越来越多地融入到各种应用中。本研究的主要目标是为 IoV 系统开发一种基于基因优化双延迟深度确定性策略梯度(TD3)算法的 ACM。TD3 模型利用深度强化学习(Deep RL)技术修改访问策略,使其符合当前场景。这样,车辆就能根据所处环境做出智能的访问决策。为了防止车辆在进入客户系统途中的能量损失,该模型还强调基于车辆能耗(EC)的访问。最后,在遗传算法(GA)的支持下,可以通过优化高级参数的方式提高访问控制模型的准确性,从而提高效率。为了进一步提高模型的环境可持续性和可靠性,所推荐的模型为物联网环境下不断变化的访问控制提供了一种既深入又高效的方法。
{"title":"Genetically optimized TD3 algorithm for efficient access control in the internet of vehicles","authors":"Abdullah A. Al-Atawi","doi":"10.1007/s11276-024-03733-1","DOIUrl":"https://doi.org/10.1007/s11276-024-03733-1","url":null,"abstract":"<p>The Internet of Vehicles (IoV) is currently experiencing significant development, which has involved the introduction of an efficient Access Control Mechanism (ACM). Reliable access control is evolving into mandatory in order to provide security and efficient transmission within the IoV environment as the volume of vehicles equipped with connectivity continues to expand and they become more incorporated into any number of applications. The primary objective of this research is to develop an ACM for the IoV system based on the use of a Genetically Optimized Twin-Delayed Delayed Deep Deterministic Policy Gradient (TD3) algorithm. The TD3 model modifies access policies to be in line with the current scenario using deep reinforcement learning (Deep RL) techniques. This allows vehicles to make access decisions that are intelligent about the environment in which they are performing. To prevent energy loss while the vehicle is in transit into the client system, the model also emphasizes access based on the vehicle's energy consumption (EC). Finally, with the support of the genetic algorithm (GA), the accuracy of the access control model can be improved by optimizing the high-level parameters in a manner in which they improves efficiency. In order to further enhance the model's environmental sustainability and reliability, the recommended model provides an approach that is both profound and efficient for access control in the constantly changing setting of the IoV.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"159 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bag of tricks for backdoor learning 后门学习的窍门袋
IF 3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-05 DOI: 10.1007/s11276-024-03724-2
Ruitao Hou, Anli Yan, Hongyang Yan, Teng Huang

Deep learning models are vulnerable to backdoor attacks, where an adversary aims to fool the model via data poisoning, such that the victim models perform well on clean samples but behave wrongly on poisoned samples. While researchers have studied backdoor attacks in depth, they have focused on specific attack and defense methods, neglecting the impacts of basic training tricks on the effect of backdoor attacks. Analyzing these influencing factors helps facilitate secure deep learning systems and explore novel defense perspectives. To this end, we provide comprehensive evaluations using a weak clean-label backdoor attack on CIFAR10, focusing on the impacts of a wide range of neglected training tricks on backdoor attacks. Specifically, we concentrate on ten perspectives, e.g., batch size, data augmentation, warmup, and mixup, etc. The results demonstrate that backdoor attacks are sensitive to some training tricks, and optimizing the basic training tricks can significantly improve the effect of backdoor attacks. For example, appropriate warmup settings can enhance the effect of backdoor attacks by 22% and 6% for the two different trigger patterns, respectively. These facts further reveal the vulnerability of deep learning models to backdoor attacks.

深度学习模型容易受到后门攻击,即对手通过数据下毒来愚弄模型,使受害模型在干净样本上表现良好,但在中毒样本上表现错误。虽然研究人员对后门攻击进行了深入研究,但他们关注的是特定的攻击和防御方法,而忽视了基本训练技巧对后门攻击效果的影响。分析这些影响因素有助于促进深度学习系统的安全,并探索新的防御视角。为此,我们利用对 CIFAR10 的弱清洁标签后门攻击进行了全面评估,重点研究了各种被忽视的训练技巧对后门攻击的影响。具体来说,我们主要从批量大小、数据增强、热身和混合等十个方面进行了研究。结果表明,后门攻击对一些训练技巧很敏感,而优化基本训练技巧可以显著改善后门攻击的效果。例如,对于两种不同的触发模式,适当的热身设置可以将后门攻击的效果分别提高 22% 和 6%。这些事实进一步揭示了深度学习模型在后门攻击面前的脆弱性。
{"title":"Bag of tricks for backdoor learning","authors":"Ruitao Hou, Anli Yan, Hongyang Yan, Teng Huang","doi":"10.1007/s11276-024-03724-2","DOIUrl":"https://doi.org/10.1007/s11276-024-03724-2","url":null,"abstract":"<p>Deep learning models are vulnerable to backdoor attacks, where an adversary aims to fool the model via data poisoning, such that the victim models perform well on clean samples but behave wrongly on poisoned samples. While researchers have studied backdoor attacks in depth, they have focused on specific attack and defense methods, neglecting the impacts of basic training tricks on the effect of backdoor attacks. Analyzing these influencing factors helps facilitate secure deep learning systems and explore novel defense perspectives. To this end, we provide comprehensive evaluations using a weak clean-label backdoor attack on CIFAR10, focusing on the impacts of a wide range of neglected training tricks on backdoor attacks. Specifically, we concentrate on ten perspectives, e.g., batch size, data augmentation, warmup, and mixup, etc. The results demonstrate that backdoor attacks are sensitive to some training tricks, and optimizing the basic training tricks can significantly improve the effect of backdoor attacks. For example, appropriate warmup settings can enhance the effect of backdoor attacks by 22% and 6% for the two different trigger patterns, respectively. These facts further reveal the vulnerability of deep learning models to backdoor attacks.</p>","PeriodicalId":23750,"journal":{"name":"Wireless Networks","volume":"32 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Wireless Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1