首页 > 最新文献

Wirel. Commun. Mob. Comput.最新文献

英文 中文
A Higher-Order Motif-Based Spatiotemporal Graph Imputation Approach for Transportation Networks 一种基于高阶模序的交通网络时空图插值方法
Pub Date : 2022-01-17 DOI: 10.1155/2022/1702170
Difeng Zhu, Guojiang Shen, Jingjing Chen, Wenfeng Zhou, Xiangjie Kong
Due to the incomplete coverage and failure of traffic data collectors during the collection, traffic data usually suffers from information missing. Achieving accurate imputation is critical to the operation of transportation networks. Existing approaches usually focus on the characteristic analysis of temporal variation and adjacent spatial representation, and the consideration of higher-order spatial correlations and continuous data missing attracts more attentions from the academia and industry. In this paper, by leveraging motif-based graph aggregation, we propose a spatiotemporal imputation approach to address the issue of traffic data missing. First, through motif discovery, the higher-order graph aggregation model was presented in traffic networks. It utilized graph convolution network (GCN) to polymerize the correlated segment attributes of the missing data segments. Then, the multitime dimension imputation model based on bidirectional long short-term memory (Bi-LSTM) incorporated the recent, daily-periodic, and weekly-periodic dependencies of the historical data. Finally, the spatial aggregated values and the temporal fusion values were integrated to obtain the results. We conducted comprehensive experiments based on the real-world dataset and discussed the case of random and continuous data missing by different time intervals, and the results showed that the proposed approach was feasible and accurate.
在采集过程中,由于交通数据采集器的不完全覆盖和故障,导致交通数据存在信息缺失的问题。实现准确的估算对交通网络的运行至关重要。现有方法多侧重于时间变化特征分析和相邻空间表示,而对高阶空间相关性和连续数据缺失的考虑更受到学术界和工业界的关注。在本文中,我们利用基于主题的图聚合,提出了一种时空插值方法来解决交通数据缺失的问题。首先,通过motif发现,提出了交通网络的高阶图聚合模型。利用图卷积网络(GCN)对缺失数据段的相关段属性进行聚合。在此基础上,建立了基于双向长短期记忆(Bi-LSTM)的历史数据近期依赖关系、日周期依赖关系和周周期依赖关系的多维数据归算模型。最后,对空间聚合值和时间融合值进行积分,得到结果。基于真实数据集进行了综合实验,讨论了不同时间间隔随机连续数据丢失的情况,结果表明所提出的方法是可行和准确的。
{"title":"A Higher-Order Motif-Based Spatiotemporal Graph Imputation Approach for Transportation Networks","authors":"Difeng Zhu, Guojiang Shen, Jingjing Chen, Wenfeng Zhou, Xiangjie Kong","doi":"10.1155/2022/1702170","DOIUrl":"https://doi.org/10.1155/2022/1702170","url":null,"abstract":"Due to the incomplete coverage and failure of traffic data collectors during the collection, traffic data usually suffers from information missing. Achieving accurate imputation is critical to the operation of transportation networks. Existing approaches usually focus on the characteristic analysis of temporal variation and adjacent spatial representation, and the consideration of higher-order spatial correlations and continuous data missing attracts more attentions from the academia and industry. In this paper, by leveraging motif-based graph aggregation, we propose a spatiotemporal imputation approach to address the issue of traffic data missing. First, through motif discovery, the higher-order graph aggregation model was presented in traffic networks. It utilized graph convolution network (GCN) to polymerize the correlated segment attributes of the missing data segments. Then, the multitime dimension imputation model based on bidirectional long short-term memory (Bi-LSTM) incorporated the recent, daily-periodic, and weekly-periodic dependencies of the historical data. Finally, the spatial aggregated values and the temporal fusion values were integrated to obtain the results. We conducted comprehensive experiments based on the real-world dataset and discussed the case of random and continuous data missing by different time intervals, and the results showed that the proposed approach was feasible and accurate.","PeriodicalId":23995,"journal":{"name":"Wirel. Commun. Mob. Comput.","volume":"68 1","pages":"1702170:1-1702170:16"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84818268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Secure and Efficient Energy Trading Model Using Blockchain for a 5G-Deployed Smart Community 基于区块链的5g智能社区安全高效的能源交易模型
Pub Date : 2022-01-17 DOI: 10.1155/2022/6953125
Adamu Sani Yahaya, Nadeem Javaid, Sameeh Ullah, Rabiya Khalid, M. Javed, Rehan Ullah Khan, Zahid Wadud, M. Khan
A Smart Community (SC) is an essential part of the Internet of Energy (IoE), which helps to integrate Electric Vehicles (EVs) and distributed renewable energy sources in a smart grid. As a result of the potential privacy and security challenges in the distributed energy system, it is becoming a great problem to optimally schedule EVs’ charging with different energy consumption patterns and perform reliable energy trading in the SC. In this paper, a blockchain-based privacy-preserving energy trading system for 5G-deployed SC is proposed. The proposed system is divided into two components: EVs and residential prosumers. In this system, a reputation-based distributed matching algorithm for EVs and a Reward-based Starvation Free Energy Allocation Policy (RSFEAP) for residential homes are presented. A short-term load forecasting model for EVs’ charging using multiple linear regression is proposed to plan and manage the intermittent charging behavior of EVs. In the proposed system, identity-based encryption and homomorphic encryption techniques are integrated to protect the privacy of transactions and users, respectively. The performance of the proposed system for EVs’ component is evaluated using convergence duration, forecasting accuracy, and executional and transactional costs as performance metrics. For the residential prosumers’ component, the performance is evaluated using reward index, type of transactions, energy contributed, average convergence time, and the number of iterations as performance metrics. The simulation results for EVs’ charging forecasting gives an accuracy of 99.25%. For the EVs matching algorithm, the proposed privacy-preserving algorithm converges faster than the bichromatic mutual nearest neighbor algorithm. For RSFEAP, the number of iterations for 50 prosumers is 8, which is smaller than the benchmark. Its convergence duration is also 10 times less than the benchmark scheme. Moreover, security and privacy analyses are presented. Finally, we carry out security vulnerability analysis of smart contracts to ensure that the proposed smart contracts are secure and bug-free against the common vulnerabilities’ attacks. The results show that the smart contracts are secure against both internal and external attacks.
智能社区(SC)是能源互联网(IoE)的重要组成部分,有助于将电动汽车(ev)和分布式可再生能源整合到智能电网中。由于分布式能源系统中潜在的隐私和安全挑战,如何优化调度不同能耗模式的电动汽车充电,并在电网中进行可靠的能源交易成为一个很大的问题。本文提出了一种基于区块链的5g电网电网能源交易系统。拟议的系统分为两个部分:电动汽车和住宅消费。在该系统中,提出了基于信誉的电动汽车分布式匹配算法和基于奖励的住宅无饥饿能源分配策略(RSFEAP)。提出了一种基于多元线性回归的电动汽车充电短期负荷预测模型,用于规划和管理电动汽车的间歇充电行为。在该系统中,基于身份的加密和同态加密技术相结合,分别保护了交易和用户的隐私。使用收敛持续时间、预测准确性以及执行和交易成本作为性能指标来评估所提出的电动汽车组件系统的性能。对于住宅产消者组件,使用奖励指数、交易类型、能源贡献、平均收敛时间和迭代次数作为性能指标来评估性能。仿真结果表明,电动汽车充电预测的准确率为99.25%。对于ev匹配算法,所提隐私保护算法收敛速度快于双色互近邻算法。对于RSFEAP, 50个proconsumer的迭代次数是8,这比基准测试要小。其收敛时间也比基准方案短10倍。此外,还进行了安全性和隐私性分析。最后,我们对智能合约进行了安全漏洞分析,以确保所提出的智能合约在常见漏洞的攻击下是安全无bug的。结果表明,智能合约对内部和外部攻击都是安全的。
{"title":"A Secure and Efficient Energy Trading Model Using Blockchain for a 5G-Deployed Smart Community","authors":"Adamu Sani Yahaya, Nadeem Javaid, Sameeh Ullah, Rabiya Khalid, M. Javed, Rehan Ullah Khan, Zahid Wadud, M. Khan","doi":"10.1155/2022/6953125","DOIUrl":"https://doi.org/10.1155/2022/6953125","url":null,"abstract":"A Smart Community (SC) is an essential part of the Internet of Energy (IoE), which helps to integrate Electric Vehicles (EVs) and distributed renewable energy sources in a smart grid. As a result of the potential privacy and security challenges in the distributed energy system, it is becoming a great problem to optimally schedule EVs’ charging with different energy consumption patterns and perform reliable energy trading in the SC. In this paper, a blockchain-based privacy-preserving energy trading system for 5G-deployed SC is proposed. The proposed system is divided into two components: EVs and residential prosumers. In this system, a reputation-based distributed matching algorithm for EVs and a Reward-based Starvation Free Energy Allocation Policy (RSFEAP) for residential homes are presented. A short-term load forecasting model for EVs’ charging using multiple linear regression is proposed to plan and manage the intermittent charging behavior of EVs. In the proposed system, identity-based encryption and homomorphic encryption techniques are integrated to protect the privacy of transactions and users, respectively. The performance of the proposed system for EVs’ component is evaluated using convergence duration, forecasting accuracy, and executional and transactional costs as performance metrics. For the residential prosumers’ component, the performance is evaluated using reward index, type of transactions, energy contributed, average convergence time, and the number of iterations as performance metrics. The simulation results for EVs’ charging forecasting gives an accuracy of 99.25%. For the EVs matching algorithm, the proposed privacy-preserving algorithm converges faster than the bichromatic mutual nearest neighbor algorithm. For RSFEAP, the number of iterations for 50 prosumers is 8, which is smaller than the benchmark. Its convergence duration is also 10 times less than the benchmark scheme. Moreover, security and privacy analyses are presented. Finally, we carry out security vulnerability analysis of smart contracts to ensure that the proposed smart contracts are secure and bug-free against the common vulnerabilities’ attacks. The results show that the smart contracts are secure against both internal and external attacks.","PeriodicalId":23995,"journal":{"name":"Wirel. Commun. Mob. Comput.","volume":"62 1","pages":"6953125:1-6953125:27"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82605686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Dynamics of 2SIH2R Rumor-Spreading Model in a Heterogeneous Network 异构网络中2SIH2R谣言传播模型的动力学研究
Pub Date : 2022-01-17 DOI: 10.1155/2022/7398387
Yan Wang, Feng Qing, Ming Yan
Due to the development of social media, the threshold for information dissemination has become lower than ever before. As a special kind of information, rumors are usually harmful and are usually accompanied by a high degree of ambiguity that makes them difficult to immediately identify, but “rumors stop at wise men.” When someone identifies a rumor as false and begins spreading the truth instead, a confrontational relationship obtains between the rumor and the truth that leads to the stifling of the former. Given this, we developed a 2SIH2R model in this study that contains mechanisms of discernment and confrontation in a heterogeneous network to examine the dissemination of the rumor and the truth. By using mean-field equations of the 2SIH2R model, the threshold of the spreading of each can be determined separately in three cases. The results of a numerical simulation show that under the same conditions, the greater is the mechanism of discernment or confrontation, the smaller is the instantaneous maximum influence and the final range of influence of the rumor. It can be also concluded that the earlier release of the truth about the event by the government can significantly control the rumor. Secondly, it is more effective to publish the truth in advance than after the rumor has appeared. Thirdly, it is more important for the government to increase education and improve the ability of citizens to reveal the rumor than to increase the spread of the truth after the rumor occurs. These results can be used to help reduce the harmful effects of rumors.
由于社交媒体的发展,信息传播的门槛比以往任何时候都要低。谣言作为一种特殊的信息,通常是有害的,通常伴随着高度的模糊性,使其难以立即识别,但“谣言止于智者”。当有人认定谣言是假的,并开始传播真相时,谣言和真相之间就会形成对抗关系,导致前者被扼杀。鉴于此,我们在本研究中开发了一个2SIH2R模型,该模型包含异质网络中的识别和对抗机制,以检验谣言和真相的传播。利用2SIH2R模型的平均场方程,可以在三种情况下分别确定每一种扩散的阈值。数值模拟结果表明,在相同条件下,辨别机制或对抗机制越大,谣言的瞬时最大影响和最终影响范围越小。这也可以得出结论,政府尽早公布事件的真相可以显著地控制谣言。其次,提前公布真相比谣言出现后更有效。第三,政府应该加大教育力度,提高公民揭露谣言的能力,而不是在谣言发生后增加真相的传播。这些结果可以用来帮助减少谣言的有害影响。
{"title":"Dynamics of 2SIH2R Rumor-Spreading Model in a Heterogeneous Network","authors":"Yan Wang, Feng Qing, Ming Yan","doi":"10.1155/2022/7398387","DOIUrl":"https://doi.org/10.1155/2022/7398387","url":null,"abstract":"Due to the development of social media, the threshold for information dissemination has become lower than ever before. As a special kind of information, rumors are usually harmful and are usually accompanied by a high degree of ambiguity that makes them difficult to immediately identify, but “rumors stop at wise men.” When someone identifies a rumor as false and begins spreading the truth instead, a confrontational relationship obtains between the rumor and the truth that leads to the stifling of the former. Given this, we developed a 2SIH2R model in this study that contains mechanisms of discernment and confrontation in a heterogeneous network to examine the dissemination of the rumor and the truth. By using mean-field equations of the 2SIH2R model, the threshold of the spreading of each can be determined separately in three cases. The results of a numerical simulation show that under the same conditions, the greater is the mechanism of discernment or confrontation, the smaller is the instantaneous maximum influence and the final range of influence of the rumor. It can be also concluded that the earlier release of the truth about the event by the government can significantly control the rumor. Secondly, it is more effective to publish the truth in advance than after the rumor has appeared. Thirdly, it is more important for the government to increase education and improve the ability of citizens to reveal the rumor than to increase the spread of the truth after the rumor occurs. These results can be used to help reduce the harmful effects of rumors.","PeriodicalId":23995,"journal":{"name":"Wirel. Commun. Mob. Comput.","volume":"19 1","pages":"7398387:1-7398387:13"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88106702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A System for Trusted Recovery of Data Based on Blockchain and Coding Techniques 基于区块链和编码技术的可信数据恢复系统
Pub Date : 2022-01-17 DOI: 10.1155/2022/8390241
Jinqian Chen, Yong Yan, Shaoyong Guo, Yinlin Ren, F. Qi
With the continuous development of information technology, the Internet of Things has also been widely used. At the same time, in the power Internet of Things environment, reliable data is essential for data use and accurate analysis. Data security has become a key factor in ensuring the stable operation of the power grid. However, the power Internet of Things devices is extremely vulnerable to network attacks, leading to data tampering and deletion. Resisting tampering, preventing data loss, and reliably restoring data have become difficult to ensure data security. In order to solve this problem, this paper proposes a trusted data recovery system based on blockchain and coding technology. Data nodes of the power Internet of Things encode key data and back them up to the blockchain network through a data processing server located on the edge. The data processing server performs real-time detection of the data integrity of the data nodes. When the data is tampered with or deleted, the data processing server promptly obtains the corresponding data encoding blocks from the blockchain network, decodes them, and sends them to the data node to complete the data recovery task. According to the test result, the data backup speed of this system is increased by 15.3%, and the data recovery speed is increased by 19.8% compared with the traditional scheme. It has good security and real-time performance. Meanwhile, it reduces the network and storage resource overhead in the data backup and recovery process.
随着信息技术的不断发展,物联网也得到了广泛的应用。同时,在电力物联网环境下,可靠的数据对于数据的使用和准确分析至关重要。数据安全已成为保障电网稳定运行的关键因素。然而,电力物联网设备极易受到网络攻击,导致数据被篡改和删除。防止篡改、防止数据丢失、可靠地恢复数据已成为保证数据安全的难点。为了解决这一问题,本文提出了一种基于区块链和编码技术的可信数据恢复系统。电力物联网数据节点对关键数据进行编码,并通过位于边缘的数据处理服务器备份到区块链网络。数据处理服务器实时检测数据节点的数据完整性。当数据被篡改或删除时,数据处理服务器及时从区块链网络中获取相应的数据编码块,解码后发送给数据节点,完成数据恢复任务。测试结果表明,与传统方案相比,该方案的数据备份速度提高了15.3%,数据恢复速度提高了19.8%。具有良好的安全性和实时性。同时减少了数据备份和恢复过程中的网络和存储资源开销。
{"title":"A System for Trusted Recovery of Data Based on Blockchain and Coding Techniques","authors":"Jinqian Chen, Yong Yan, Shaoyong Guo, Yinlin Ren, F. Qi","doi":"10.1155/2022/8390241","DOIUrl":"https://doi.org/10.1155/2022/8390241","url":null,"abstract":"With the continuous development of information technology, the Internet of Things has also been widely used. At the same time, in the power Internet of Things environment, reliable data is essential for data use and accurate analysis. Data security has become a key factor in ensuring the stable operation of the power grid. However, the power Internet of Things devices is extremely vulnerable to network attacks, leading to data tampering and deletion. Resisting tampering, preventing data loss, and reliably restoring data have become difficult to ensure data security. In order to solve this problem, this paper proposes a trusted data recovery system based on blockchain and coding technology. Data nodes of the power Internet of Things encode key data and back them up to the blockchain network through a data processing server located on the edge. The data processing server performs real-time detection of the data integrity of the data nodes. When the data is tampered with or deleted, the data processing server promptly obtains the corresponding data encoding blocks from the blockchain network, decodes them, and sends them to the data node to complete the data recovery task. According to the test result, the data backup speed of this system is increased by 15.3%, and the data recovery speed is increased by 19.8% compared with the traditional scheme. It has good security and real-time performance. Meanwhile, it reduces the network and storage resource overhead in the data backup and recovery process.","PeriodicalId":23995,"journal":{"name":"Wirel. Commun. Mob. Comput.","volume":"26 1","pages":"8390241:1-8390241:12"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87494657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
X-Shaped Slotted Patch Biomedical Implantable Antenna for Wireless Communication Networks 用于无线通信网络的x形开槽贴片生物医学植入天线
Pub Date : 2022-01-17 DOI: 10.1155/2022/7594587
Sarosh Ahmad, Bilal Manzoor, Salman Naseer, Nilton Santos-Valdivia, A. Ghaffar, M. I. Abbasi
Biomedical implantable antennas have a major role in biomedical telemetry applications. Therefore, a compact-size low-profile implantable antenna working in industrial, scientific, and medical (ISM) band at 915 MHz is presented. The presented antenna is a simple slotted patch fed with a coaxial probe of 50 Ω impedance. The patch consists of four slotted resonators printed on a flexible Roger Duroid RT5880 substrate ( ε r = 2.2 , tan δ = 0.0009 ) with the standard thickness of 0.254 mm. The complete volume of the designed antenna is 7   mm × 7   mm × 0.254   mm ( 0.08 λ g × 0.08 λ g × 0.003 λ g ). The antenna covers the bandwidth from 800 MHz to 1 GHz (200 MHz) inside skin tissue. A good agreement between the simulation and measurements of the antenna has been obtained. Finally, the specific absorption rate (SAR) values have also been analyzed through simulations as 8.17 W/kg inside skin over 1 g of mass tissue. The proposed SAR values are less than the limit of the Federal Communications Commission (FCC). This antenna is miniaturized and an ideal applicant for applications in biomedical implants.
生物医学植入式天线在生物医学遥测应用中具有重要作用。因此,提出了一种在915 MHz的工业、科学和医疗(ISM)频段工作的紧凑尺寸的低轮廓植入式天线。所提出的天线是一个简单的开槽贴片馈电同轴探头50 Ω阻抗。该贴片由四个槽谐振器组成,印刷在柔性Roger Duroid RT5880衬底上(ε r = 2.2, tan δ = 0.0009),标准厚度为0.254 mm。设计天线的总体积为7 mm × 7 mm × 0.254 mm (0.08 λ g × 0.08 λ g × 0.003 λ g)。该天线覆盖皮肤组织内部800 - 1ghz (200mhz)的带宽。仿真结果与实测结果吻合较好。最后,通过模拟分析了比吸收率(SAR)值为8.17 W/kg / 1g质量组织的皮肤内。建议的SAR值小于美国联邦通信委员会(FCC)的限制。这种天线是小型化的,是生物医学植入物应用的理想申请人。
{"title":"X-Shaped Slotted Patch Biomedical Implantable Antenna for Wireless Communication Networks","authors":"Sarosh Ahmad, Bilal Manzoor, Salman Naseer, Nilton Santos-Valdivia, A. Ghaffar, M. I. Abbasi","doi":"10.1155/2022/7594587","DOIUrl":"https://doi.org/10.1155/2022/7594587","url":null,"abstract":"Biomedical implantable antennas have a major role in biomedical telemetry applications. Therefore, a compact-size low-profile implantable antenna working in industrial, scientific, and medical (ISM) band at 915 MHz is presented. The presented antenna is a simple slotted patch fed with a coaxial probe of 50 Ω impedance. The patch consists of four slotted resonators printed on a flexible Roger Duroid RT5880 substrate (\u0000 \u0000 \u0000 \u0000 ε\u0000 \u0000 \u0000 r\u0000 \u0000 \u0000 =\u0000 2.2\u0000 \u0000 , \u0000 \u0000 tan\u0000 δ\u0000 =\u0000 0.0009\u0000 \u0000 ) with the standard thickness of 0.254 mm. The complete volume of the designed antenna is \u0000 \u0000 7\u0000  \u0000 mm\u0000 ×\u0000 7\u0000  \u0000 mm\u0000 ×\u0000 0.254\u0000  \u0000 mm\u0000 \u0000 (\u0000 \u0000 0.08\u0000 \u0000 \u0000 λ\u0000 \u0000 \u0000 g\u0000 \u0000 \u0000 ×\u0000 0.08\u0000 \u0000 \u0000 λ\u0000 \u0000 \u0000 g\u0000 \u0000 \u0000 ×\u0000 0.003\u0000 \u0000 \u0000 λ\u0000 \u0000 \u0000 g\u0000 \u0000 \u0000 \u0000 ). The antenna covers the bandwidth from 800 MHz to 1 GHz (200 MHz) inside skin tissue. A good agreement between the simulation and measurements of the antenna has been obtained. Finally, the specific absorption rate (SAR) values have also been analyzed through simulations as 8.17 W/kg inside skin over 1 g of mass tissue. The proposed SAR values are less than the limit of the Federal Communications Commission (FCC). This antenna is miniaturized and an ideal applicant for applications in biomedical implants.","PeriodicalId":23995,"journal":{"name":"Wirel. Commun. Mob. Comput.","volume":"21 1","pages":"7594587:1-7594587:11"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87319887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Influence of Embedded Microprocessor Wireless Communication and Computer Vision in Wushu Competition Referees' Decision Support 嵌入式微处理器无线通信与计算机视觉对武术比赛裁判员决策支持的影响
Pub Date : 2022-01-17 DOI: 10.1155/2022/2121573
Jin-lu Ji, Feng Liang
With the development of computer technology and management science, decision support systems have emerged that can improve the quality and effects of decision-making. This study mainly examined the application of the wireless communication of an embedded microprocessor and computer vision in the decision support system of martial arts competition referees. Using the embedded microprocessor’s characteristics of a small size, high precision, high reliability, and high efficiency, a decision support system for martial arts competition referees was designed. In the experiment, the similarity between the target field and the source field could be controlled by adjusting the mean value. To better extract the target, this study used the time domain changes of the three adjacent frames, before, middle, and back, to detect the moving target to extract the change detection template. The Canny edge detection method was used to extract the edge information of the image and eliminate the nonmotion area; then, morphology was used to correct the image to complete the connection of the broken edge to obtain the final initial segmentation mask image. In the process of calculation, there were some noises and small fragments. In this study, morphology and background difference were used to optimize the segmented image. Experimental data show that the algorithm detection accuracy rate was high—between 70% and 100%—and the effect was relatively ideal. The results indicate that the proposed algorithm can effectively reduce matching noise, improve the matching accuracy of the edge area and the low-texture area, and achieve a fast matching speed.
随着计算机技术和管理科学的发展,能够提高决策质量和效果的决策支持系统应运而生。本研究主要研究嵌入式微处理器无线通信与计算机视觉在武术比赛裁判员决策支持系统中的应用。利用嵌入式微处理器体积小、精度高、可靠性高、效率高等特点,设计了武术比赛裁判员决策支持系统。在实验中,可以通过调整平均值来控制目标场与源场的相似度。为了更好地提取目标,本研究利用前、中、后三帧相邻帧的时域变化对运动目标进行检测,提取变化检测模板。采用Canny边缘检测方法提取图像边缘信息,剔除非运动区域;然后,利用形态学对图像进行校正,完成破碎边缘的连接,得到最终的初始分割掩模图像。在计算过程中,会出现一些噪声和小碎片。本研究采用形态学和背景差分对分割图像进行优化。实验数据表明,该算法检测准确率较高,在70% ~ 100%之间,效果较为理想。结果表明,该算法能有效降低匹配噪声,提高边缘区域和低纹理区域的匹配精度,实现较快的匹配速度。
{"title":"Influence of Embedded Microprocessor Wireless Communication and Computer Vision in Wushu Competition Referees' Decision Support","authors":"Jin-lu Ji, Feng Liang","doi":"10.1155/2022/2121573","DOIUrl":"https://doi.org/10.1155/2022/2121573","url":null,"abstract":"With the development of computer technology and management science, decision support systems have emerged that can improve the quality and effects of decision-making. This study mainly examined the application of the wireless communication of an embedded microprocessor and computer vision in the decision support system of martial arts competition referees. Using the embedded microprocessor’s characteristics of a small size, high precision, high reliability, and high efficiency, a decision support system for martial arts competition referees was designed. In the experiment, the similarity between the target field and the source field could be controlled by adjusting the mean value. To better extract the target, this study used the time domain changes of the three adjacent frames, before, middle, and back, to detect the moving target to extract the change detection template. The Canny edge detection method was used to extract the edge information of the image and eliminate the nonmotion area; then, morphology was used to correct the image to complete the connection of the broken edge to obtain the final initial segmentation mask image. In the process of calculation, there were some noises and small fragments. In this study, morphology and background difference were used to optimize the segmented image. Experimental data show that the algorithm detection accuracy rate was high—between 70% and 100%—and the effect was relatively ideal. The results indicate that the proposed algorithm can effectively reduce matching noise, improve the matching accuracy of the edge area and the low-texture area, and achieve a fast matching speed.","PeriodicalId":23995,"journal":{"name":"Wirel. Commun. Mob. Comput.","volume":"10 1","pages":"2121573:1-2121573:13"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82944134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
AI-Empowered Propagation Prediction and Optimization for Reconfigurable Wireless Networks 基于ai的可重构无线网络传播预测与优化
Pub Date : 2022-01-17 DOI: 10.1155/2022/9901960
Fusheng Zhu, Weiwen Cai, Zhigang Wang, Fang Li
Vehicular ad-hoc network (VANET) is one of the most important components to realizing intelligent connected vehicles, which is a high-commercial-value vertical application of the fifth-generation (5G) mobile communication system and beyond communications. VANET requires both ultrareliable low latency and high-data rate communications. In order to evolve towards the reconfigurable wireless networks (RWNs), the 5G mobile communication system is expected to adapt the key parameters of its radio nodes rapidly. However, the current propagation prediction approaches are difficult to balance accuracy and efficiency, which makes the current network unable to perform autonomous optimization agilely. In order to break through this bottleneck, an accurate and efficient propagation prediction and optimization method empowered by artificial intelligence (AI) is proposed in this paper. Initially, a path loss model based on a multilayer perception neural network is established at 2.6 GHz for three base stations in an urban environment. Not like empirical models using environment types or deterministic models employing three-dimensional environment models, this AI-empowered model explores the environment feature by introducing interference clutters. This critical innovation makes the proposed model so accurate as ray tracing but much more efficient. Then, this validated model is utilized to realize a coverage prediction for 20 base stations only within 1 minute. Afterward, key parameters of these base stations, such as transmission power, elevation, and azimuth angles of antennas, are optimized using simulated annealing. This whole methodology paves the way for evolving the current 5G network to RWNs.
车载自组织网络(VANET)是实现智能网联汽车的重要组成部分之一,是第五代(5G)移动通信系统及超越通信的高商业价值垂直应用。VANET需要超可靠的低延迟和高数据速率通信。为了向可重构无线网络(RWNs)演进,5G移动通信系统需要快速适应其无线电节点的关键参数。然而,目前的传播预测方法难以平衡准确性和效率,这使得当前网络无法灵活地进行自主优化。为了突破这一瓶颈,本文提出了一种基于人工智能(AI)的准确高效的传播预测与优化方法。首先,针对城市环境下的三个基站,在2.6 GHz频段建立了基于多层感知神经网络的路径损耗模型。与使用环境类型的经验模型或使用三维环境模型的确定性模型不同,这种人工智能支持的模型通过引入干扰杂波来探索环境特征。这一关键的创新使得所提出的模型与光线追踪一样精确,但效率更高。然后,利用该验证模型在1分钟内实现了对20个基站的覆盖预测。然后,利用模拟退火技术对这些基站的发射功率、天线仰角和方位角等关键参数进行优化。整个方法为将当前的5G网络发展为RWNs铺平了道路。
{"title":"AI-Empowered Propagation Prediction and Optimization for Reconfigurable Wireless Networks","authors":"Fusheng Zhu, Weiwen Cai, Zhigang Wang, Fang Li","doi":"10.1155/2022/9901960","DOIUrl":"https://doi.org/10.1155/2022/9901960","url":null,"abstract":"Vehicular ad-hoc network (VANET) is one of the most important components to realizing intelligent connected vehicles, which is a high-commercial-value vertical application of the fifth-generation (5G) mobile communication system and beyond communications. VANET requires both ultrareliable low latency and high-data rate communications. In order to evolve towards the reconfigurable wireless networks (RWNs), the 5G mobile communication system is expected to adapt the key parameters of its radio nodes rapidly. However, the current propagation prediction approaches are difficult to balance accuracy and efficiency, which makes the current network unable to perform autonomous optimization agilely. In order to break through this bottleneck, an accurate and efficient propagation prediction and optimization method empowered by artificial intelligence (AI) is proposed in this paper. Initially, a path loss model based on a multilayer perception neural network is established at 2.6 GHz for three base stations in an urban environment. Not like empirical models using environment types or deterministic models employing three-dimensional environment models, this AI-empowered model explores the environment feature by introducing interference clutters. This critical innovation makes the proposed model so accurate as ray tracing but much more efficient. Then, this validated model is utilized to realize a coverage prediction for 20 base stations only within 1 minute. Afterward, key parameters of these base stations, such as transmission power, elevation, and azimuth angles of antennas, are optimized using simulated annealing. This whole methodology paves the way for evolving the current 5G network to RWNs.","PeriodicalId":23995,"journal":{"name":"Wirel. Commun. Mob. Comput.","volume":"61 1","pages":"9901960:1-9901960:10"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78177176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
C SVM Classification and KNN Techniques for Cyber Crime Detection C支持向量机分类和KNN技术用于网络犯罪检测
Pub Date : 2022-01-17 DOI: 10.1155/2022/3640017
K. Veena, K. Meena, Yuvaraja Teekaraman, Ramya Kuppusamy, A. Radhakrishnan
In the digital age, cybercrime is spreading its root widely. Internet evolution has turned out to a boon as well as curse for those confronting the issues of privacy, national security, social decency, IP rights, child protection, fighting, detecting, and prosecuting cybercrime. Hence, there arises a need to detect the cybercriminal. Cybercrime identification utilizes dataset that is taken from CBS open dataset. For identifying the cybercriminal, support vector machine (SVM) in the C SVM classification and K -nearest neighbor (KNN) models is utilized for determining the cybercrime information. The evaluation of the performance is done taking the following metrics into consideration: true positive, false positive, true negative and false negative, false alarm rate, detection rate, accuracy, recall, precision, specificity, sensitivity, classification rate, and Fowlkes-Mallows Scores. Expectation maximization (EM) calculation is utilized for evaluating the presentation of the Gaussian mixture model. The performance of classifier’s presentation is also done. Accuracy is accomplished in the event of grouping by means of SVM classifier as 89% in the supervised method.
在数字时代,网络犯罪正在广泛蔓延。对于那些面临隐私、国家安全、社会尊严、知识产权、儿童保护、打击、侦查和起诉网络犯罪等问题的人来说,互联网的发展既是一种福音,也是一种诅咒。因此,有必要检测网络罪犯。网络犯罪识别利用的数据集取自CBS开放数据集。为了识别网络犯罪分子,使用C支持向量机分类和K最近邻(KNN)模型中的支持向量机(SVM)确定网络犯罪信息。对性能的评估考虑了以下指标:真阳性,假阳性,真阴性和假阴性,假报警率,检出率,准确性,召回率,精密度,特异性,敏感性,分类率和Fowlkes-Mallows评分。期望最大化(EM)计算用于评价高斯混合模型的表现性。并对分类器的呈现性能进行了分析。在监督方法中,SVM分类器在分组时的准确率达到89%。
{"title":"C SVM Classification and KNN Techniques for Cyber Crime Detection","authors":"K. Veena, K. Meena, Yuvaraja Teekaraman, Ramya Kuppusamy, A. Radhakrishnan","doi":"10.1155/2022/3640017","DOIUrl":"https://doi.org/10.1155/2022/3640017","url":null,"abstract":"In the digital age, cybercrime is spreading its root widely. Internet evolution has turned out to a boon as well as curse for those confronting the issues of privacy, national security, social decency, IP rights, child protection, fighting, detecting, and prosecuting cybercrime. Hence, there arises a need to detect the cybercriminal. Cybercrime identification utilizes dataset that is taken from CBS open dataset. For identifying the cybercriminal, support vector machine (SVM) in the \u0000 \u0000 C\u0000 \u0000 SVM classification and \u0000 \u0000 K\u0000 \u0000 -nearest neighbor (KNN) models is utilized for determining the cybercrime information. The evaluation of the performance is done taking the following metrics into consideration: true positive, false positive, true negative and false negative, false alarm rate, detection rate, accuracy, recall, precision, specificity, sensitivity, classification rate, and Fowlkes-Mallows Scores. Expectation maximization (EM) calculation is utilized for evaluating the presentation of the Gaussian mixture model. The performance of classifier’s presentation is also done. Accuracy is accomplished in the event of grouping by means of SVM classifier as 89% in the supervised method.","PeriodicalId":23995,"journal":{"name":"Wirel. Commun. Mob. Comput.","volume":"21 1","pages":"3640017:1-3640017:9"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82267202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Fusion Deep Learning and Machine Learning for Heterogeneous Military Entity Recognition 融合深度学习和机器学习在异构军事实体识别中的应用
Pub Date : 2022-01-17 DOI: 10.1155/2022/1103022
Hui Li, Lin Yu, J. Zhang, Ming Lyu
With respect to the fuzzy boundaries of military heterogeneous entities, this paper improves the entity annotation mechanism for entity with fuzzy boundaries based on related research works. This paper applies a BERT-BiLSTM-CRF model fusing deep learning and machine learning to recognize military entities, and thus, we can construct a smart military knowledge base with these entities. Furthermore, we can explore many military AI applications with the knowledge base and military Internet of Things (MIoT). To verify the performance of the model, we design multiple types of experiments. Experimental results show that the recognition performance of the model keeps improving with the increasing size of the corpus in the multidata source scenario, with the F -score increasing from 73.56% to 84.53%. Experimental results of cross-corpus cross-validation show that the more types of entities covered in the training corpus and the richer the representation type, the stronger the generalization ability of the trained model, in which the recall rate of the model trained with the novel random type corpus reaches 74.33% and the F -score reaches 76.98%. The results of the multimodel comparison experiments show that the BERT-BiLSTM-CRF model applied in this paper performs well for the recognition of military entities. The longitudinal comparison experimental results show that the F -score of the BERT-BiLSTM-CRF model is 18.72%, 11.24%, 9.24%, and 5.07% higher than the four models CRF, LSTM-CRF, BiLSTM-CR, and BERT-CRF, respectively. The cross-sectional comparison experimental results show that the F -score of the BERT-BiLSTM-CRF model improved by 6.63%, 7.95%, 3.72%, and 1.81% compared to the Lattice-LSTM-CRF, CNN-BiLSTM-CRF, BERT-BiGRU-CRF, and BERT-IDCNN-CRF models, respectively.
针对军事异构实体的模糊边界问题,在借鉴相关研究成果的基础上,改进了模糊边界实体的实体标注机制。本文采用BERT-BiLSTM-CRF模型,融合深度学习和机器学习对军事实体进行识别,从而利用这些实体构建智能军事知识库。此外,我们可以利用知识库和军事物联网(MIoT)探索许多军事人工智能应用。为了验证模型的性能,我们设计了多种类型的实验。实验结果表明,在多数据源场景下,随着语料库规模的增加,模型的识别性能不断提高,F分数从73.56%提高到84.53%。跨语料库交叉验证的实验结果表明,训练语料库中涵盖的实体类型越多,表示类型越丰富,训练模型的泛化能力越强,其中使用新型随机类型语料库训练的模型召回率达到74.33%,F -score达到76.98%。多模型对比实验结果表明,本文所采用的BERT-BiLSTM-CRF模型对军事实体的识别效果良好。纵向对比实验结果表明,BERT-BiLSTM-CRF模型的F -得分分别比CRF、LSTM-CRF、BiLSTM-CR和BERT-CRF四种模型高18.72%、11.24%、9.24%和5.07%。横断面对比实验结果表明,BERT-BiLSTM-CRF模型的F -得分分别比Lattice-LSTM-CRF、CNN-BiLSTM-CRF、BERT-BiGRU-CRF和BERT-IDCNN-CRF模型提高了6.63%、7.95%、3.72%和1.81%。
{"title":"Fusion Deep Learning and Machine Learning for Heterogeneous Military Entity Recognition","authors":"Hui Li, Lin Yu, J. Zhang, Ming Lyu","doi":"10.1155/2022/1103022","DOIUrl":"https://doi.org/10.1155/2022/1103022","url":null,"abstract":"With respect to the fuzzy boundaries of military heterogeneous entities, this paper improves the entity annotation mechanism for entity with fuzzy boundaries based on related research works. This paper applies a BERT-BiLSTM-CRF model fusing deep learning and machine learning to recognize military entities, and thus, we can construct a smart military knowledge base with these entities. Furthermore, we can explore many military AI applications with the knowledge base and military Internet of Things (MIoT). To verify the performance of the model, we design multiple types of experiments. Experimental results show that the recognition performance of the model keeps improving with the increasing size of the corpus in the multidata source scenario, with the \u0000 \u0000 F\u0000 \u0000 -score increasing from 73.56% to 84.53%. Experimental results of cross-corpus cross-validation show that the more types of entities covered in the training corpus and the richer the representation type, the stronger the generalization ability of the trained model, in which the recall rate of the model trained with the novel random type corpus reaches 74.33% and the \u0000 \u0000 F\u0000 \u0000 -score reaches 76.98%. The results of the multimodel comparison experiments show that the BERT-BiLSTM-CRF model applied in this paper performs well for the recognition of military entities. The longitudinal comparison experimental results show that the \u0000 \u0000 F\u0000 \u0000 -score of the BERT-BiLSTM-CRF model is 18.72%, 11.24%, 9.24%, and 5.07% higher than the four models CRF, LSTM-CRF, BiLSTM-CR, and BERT-CRF, respectively. The cross-sectional comparison experimental results show that the \u0000 \u0000 F\u0000 \u0000 -score of the BERT-BiLSTM-CRF model improved by 6.63%, 7.95%, 3.72%, and 1.81% compared to the Lattice-LSTM-CRF, CNN-BiLSTM-CRF, BERT-BiGRU-CRF, and BERT-IDCNN-CRF models, respectively.","PeriodicalId":23995,"journal":{"name":"Wirel. Commun. Mob. Comput.","volume":"2 1","pages":"1103022:1-1103022:11"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82943389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of Multipath Fading and Doppler Effect with Multiple Reconfigurable Intelligent Surfaces in Mobile Wireless Networks 移动无线网络中多个可重构智能曲面的多径衰落和多普勒效应分析
Pub Date : 2022-01-17 DOI: 10.1155/2022/5751316
Guilu Wu, Fan Li, Huilin Jiang
The multipath fading and Doppler effect are well-known phenomena affecting channel quality in mobile wireless communication systems. Within this context, the emergence of reconfigurable intelligence surfaces (RISs) brings a chance to achieve this goal. RISs as a potential solution are considered to be proposed in sixth generation (6G). The core idea of RISs is to change the channel characteristic from uncontrollable to controllable. This is reflected by some novel functionalities with wave absorption and abnormal reflection. In this paper, the multipath fading and Doppler effect are characterized by establishing a mathematical model from the perspective of reflectors and RISs in different mobile wireless communication processes. In addition, the solutions that improve the multipath fading and Doppler effect stemming from the movement of mobile transmitter are discussed by utilizing multiple RISs. A large number of experimental results demonstrate that the received signal strength abnormal fluctuations due to Doppler effect can be eliminated effectively by real-time control of RISs. Meanwhile, the multipath fading is also mitigated when all reflectors deployed are coated with RISs.
在移动无线通信系统中,多径衰落和多普勒效应是影响信道质量的常见现象。在这种背景下,可重构智能表面(RISs)的出现为实现这一目标提供了机会。RISs作为一种潜在的解决方案被认为是在第六代(6G)中提出的。RISs的核心思想是将信道特性从不可控变为可控。这反映在一些新的功能与波吸收和异常反射。本文从不同移动无线通信过程中的反射器和RISs角度建立了多径衰落和多普勒效应的数学模型。此外,还讨论了利用多个RISs来改善移动发射机运动引起的多径衰落和多普勒效应的解决方案。大量实验结果表明,通过实时控制RISs可以有效地消除多普勒效应引起的接收信号强度异常波动。同时,当部署的所有反射器都覆盖RISs时,多径衰落也得到了缓解。
{"title":"Analysis of Multipath Fading and Doppler Effect with Multiple Reconfigurable Intelligent Surfaces in Mobile Wireless Networks","authors":"Guilu Wu, Fan Li, Huilin Jiang","doi":"10.1155/2022/5751316","DOIUrl":"https://doi.org/10.1155/2022/5751316","url":null,"abstract":"The multipath fading and Doppler effect are well-known phenomena affecting channel quality in mobile wireless communication systems. Within this context, the emergence of reconfigurable intelligence surfaces (RISs) brings a chance to achieve this goal. RISs as a potential solution are considered to be proposed in sixth generation (6G). The core idea of RISs is to change the channel characteristic from uncontrollable to controllable. This is reflected by some novel functionalities with wave absorption and abnormal reflection. In this paper, the multipath fading and Doppler effect are characterized by establishing a mathematical model from the perspective of reflectors and RISs in different mobile wireless communication processes. In addition, the solutions that improve the multipath fading and Doppler effect stemming from the movement of mobile transmitter are discussed by utilizing multiple RISs. A large number of experimental results demonstrate that the received signal strength abnormal fluctuations due to Doppler effect can be eliminated effectively by real-time control of RISs. Meanwhile, the multipath fading is also mitigated when all reflectors deployed are coated with RISs.","PeriodicalId":23995,"journal":{"name":"Wirel. Commun. Mob. Comput.","volume":"9 1","pages":"5751316:1-5751316:15"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90243029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Wirel. Commun. Mob. Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1