首页 > 最新文献

International Journal of Computer Networks and Applications最新文献

英文 中文
Multi-Criteria Optimization Based VM Placement Strategy to Mitigate Co-Location Risks in Data Centers 基于多准则优化的虚拟机布局策略缓解数据中心异地风险
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215912
N. Chandrakala, Vamsidhar Enireddy
– Cloud providers generally run one or more Virtual Machine (VM) instances on the same physical machine. Though it increases data center utilization, it exposes VM to a co-location attack. VM placement and migration are the two strategies adopted for mitigating co-locations. Current methods for VM placement or VM migration consider only security as decision criteria and do not consider other factors like Quality-of-Service degradation, data center utilization, etc. This work proposes a placement and migration strategy for mitigation of co-location attacks with joint consideration of multi objectives like QoS, data center utilization, energy consumption, and security risks. A security-driven multi-criteria optimization -based VM placement policy is proposed. A joint consideration of multi objective performance optimization along with co-location security risk minimization is done to design a novel VM placement policy based on user categorization. The policy can reduce the likelihood of co-location target VM with attacker VM without much degradation to the performance of VM and data center utilization. The solution mitigates co-location risks without much compromise to the performance of VM and data center resource utilization. The co-residence risk is mitigated by the categorization of users into three levels i.e. unlabeled, risky, and safe, and physical machines into two groups as safe and unsafe. The PMs available in data center is grouped into three different VM placement policies, they are undecided pool, safe pool and unsafe pool.
–云提供商通常在同一物理机器上运行一个或多个虚拟机(VM)实例。尽管它提高了数据中心的利用率,但它使VM暴露在同一位置的攻击之下。虚拟机的放置和迁移是两种用于减少异地的策略。当前的虚拟机放置或迁移方法只考虑安全性作为决策标准,而不考虑服务质量下降、数据中心利用率等其他因素。这项工作提出了一种放置和迁移策略,用于缓解异地攻击,同时考虑QoS、数据中心使用率、能耗等多个目标,以及安全风险。提出了一种基于安全驱动的多准则优化虚拟机布局策略。将多目标性能优化与异地安全风险最小化相结合,设计了一种基于用户分类的虚拟机布局策略。该策略可以降低目标虚拟机与攻击者虚拟机共存的可能性,而不会对虚拟机的性能和数据中心利用率造成太大的降低。该解决方案在不影响虚拟机性能和数据中心资源利用率的情况下,降低了共处一地的风险。通过将用户分为三个级别(即未标记、有风险和安全),并将物理机器分为两组(即安全和不安全),可以降低共住风险。数据中心中可用的VM分为三种不同的VM放置策略,它们是未决定池、安全池和不安全池。
{"title":"Multi-Criteria Optimization Based VM Placement Strategy to Mitigate Co-Location Risks in Data Centers","authors":"N. Chandrakala, Vamsidhar Enireddy","doi":"10.22247/ijcna/2022/215912","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215912","url":null,"abstract":"– Cloud providers generally run one or more Virtual Machine (VM) instances on the same physical machine. Though it increases data center utilization, it exposes VM to a co-location attack. VM placement and migration are the two strategies adopted for mitigating co-locations. Current methods for VM placement or VM migration consider only security as decision criteria and do not consider other factors like Quality-of-Service degradation, data center utilization, etc. This work proposes a placement and migration strategy for mitigation of co-location attacks with joint consideration of multi objectives like QoS, data center utilization, energy consumption, and security risks. A security-driven multi-criteria optimization -based VM placement policy is proposed. A joint consideration of multi objective performance optimization along with co-location security risk minimization is done to design a novel VM placement policy based on user categorization. The policy can reduce the likelihood of co-location target VM with attacker VM without much degradation to the performance of VM and data center utilization. The solution mitigates co-location risks without much compromise to the performance of VM and data center resource utilization. The co-residence risk is mitigated by the categorization of users into three levels i.e. unlabeled, risky, and safe, and physical machines into two groups as safe and unsafe. The PMs available in data center is grouped into three different VM placement policies, they are undecided pool, safe pool and unsafe pool.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46228020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Device to Device Data Transmission Based on Deep Artificial Learning in 6G Networks 6G网络中基于深度人工学习的高效设备间数据传输
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215917
V. Sridhar, S. Roslin
– The rising wireless service constraints and user compactness have to lead the progress of 6G communication in the modern days. The benefit of 6G over the presented technologies is a huge support for mixed applications and mobility maintenance. Device to Device (D2D) data transmission in 6G has great attention since it gives a better data delivery rate (DDR). Recently, several methods were established for D2D data transmission. However, energy consumption was not considered to improve the network throughput. To handle such problems, an artificial intelligence technique called Deep Neural Regressive Tangent Transfer Classifier (DNRTTC) model is introduced in this research for D2D data transmission in a 6G system. The designed method includes several layers to attain energy-efficient D2D data transmission. The primary layer is the input layer and it includes several mobile nodes as input. Nodes are transmitted to the hidden layer one. For each node, energy, received signal strength, and connection speed of each mobile node is calculated. Then the similarity analysis is done in the following layer where each node is analyzed with its threshold value. The result is sent to the output layer where the better resource mobile nodes are identified by using the activation function. This leads to attaining energy-efficient D2D data transmission in 6G. Results illustrate that the DNRTTC outperformed compared to conventional methods with better energy efficiency, packet delivery ratio, throughput.
-不断增加的无线服务限制和用户紧凑性必须引领现代6G通信的发展。6G相对于现有技术的优势是对混合应用程序和移动性维护的巨大支持。6G中的设备到设备(D2D)数据传输备受关注,因为它提供了更好的数据传输速率(DDR)。近年来,建立了几种D2D数据传输方法。然而,没有考虑能源消耗来提高网络吞吐量。为了解决这些问题,本研究引入了一种名为深度神经回归切线传输分类器(Deep Neural Regressive Tangent Transfer Classifier, DNRTTC)模型的人工智能技术,用于6G系统中的D2D数据传输。设计的方法包括多层,以实现节能的D2D数据传输。最主要的一层是输入层,它包括几个移动节点作为输入。节点被传输到隐藏层。对于每个节点,计算每个移动节点的能量、接收信号强度和连接速度。然后在下一层进行相似性分析,其中对每个节点进行阈值分析。结果被发送到输出层,在输出层中使用激活函数识别更好的资源移动节点。这可以在6G中实现节能的D2D数据传输。结果表明,与传统方法相比,DNRTTC具有更好的能效、数据包传输率和吞吐量。
{"title":"Energy Efficient Device to Device Data Transmission Based on Deep Artificial Learning in 6G Networks","authors":"V. Sridhar, S. Roslin","doi":"10.22247/ijcna/2022/215917","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215917","url":null,"abstract":"– The rising wireless service constraints and user compactness have to lead the progress of 6G communication in the modern days. The benefit of 6G over the presented technologies is a huge support for mixed applications and mobility maintenance. Device to Device (D2D) data transmission in 6G has great attention since it gives a better data delivery rate (DDR). Recently, several methods were established for D2D data transmission. However, energy consumption was not considered to improve the network throughput. To handle such problems, an artificial intelligence technique called Deep Neural Regressive Tangent Transfer Classifier (DNRTTC) model is introduced in this research for D2D data transmission in a 6G system. The designed method includes several layers to attain energy-efficient D2D data transmission. The primary layer is the input layer and it includes several mobile nodes as input. Nodes are transmitted to the hidden layer one. For each node, energy, received signal strength, and connection speed of each mobile node is calculated. Then the similarity analysis is done in the following layer where each node is analyzed with its threshold value. The result is sent to the output layer where the better resource mobile nodes are identified by using the activation function. This leads to attaining energy-efficient D2D data transmission in 6G. Results illustrate that the DNRTTC outperformed compared to conventional methods with better energy efficiency, packet delivery ratio, throughput.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44378330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid Optimization-Based Efficient Routing Protocol for Energy Consumption Minimization in Mobile Wireless Sensor Network 基于混合优化的移动无线传感器网络节能高效路由协议
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215919
V. Veerakumaran, A. Rajini
– Mobile Wireless Sensor Network (MWSN) is a dispersed network having autonomous sensor nodes which monitors physical occurrences or environmental variables in real-time. Most MWSNs have limited energy, so energy efficiency is critical. A node’s data will be routed by one of two standard methods: single-long-hop or short-multi-hop routing paths. The quantity of energy required to deliver a packet grows directly proportional to the packet’s travel distance in MWSN. Single-hop communication in MWSN, on the other hand, is typically relatively energy-intensive. The nodes located nearer to the sink are considerably perform well than the rest of the nodes in MWSN because of the multi-hop connection, resulting in a shorter lifespan for the MWSN. In this paper, Hybrid Optimization-based Efficient Routing Protocol (HOERP) is proposed to minimize the energy consumption in MWSN. HOERP involves grey wolf optimization and particle swarm optimization, where local search is done by grey wolf optimization and the global search optimization is done by particle swarm optimization. Utilizing the nonlinear parameters in HOERP assist in identifying the optimized cum successful route leading to consume less energy. HOERP is evaluated in NS3 using the metrics standardly used in network-oriented researches. Result highlights that HOERP consumes less energy to deliver data packets than the current routing protocols.
–移动无线传感器网络(MWSN)是一个具有自主传感器节点的分散网络,可实时监控物理事件或环境变量。大多数MWSN的能量有限,因此能源效率至关重要。节点的数据将通过两种标准方法之一进行路由:单长跳或短多跳路由路径。递送数据包所需的能量与数据包在MWSN中的行进距离成正比。另一方面,MWSN中的单跳通信通常是相对耗能的。由于多跳连接,位于更靠近汇点的节点比MWSN中的其他节点表现得相当好,导致MWSN的寿命更短。本文提出了一种基于混合优化的高效路由协议(HOERP),以最大限度地降低MWSN的能耗。HOERP包括灰狼优化和粒子群优化,其中局部搜索由灰狼优化完成,全局搜索由粒子群优化完成。利用HOERP中的非线性参数有助于确定优化的成功路线,从而减少能耗。HOERP在NS3中使用面向网络的研究中标准使用的度量进行评估。结果表明,HOERP传输数据包所消耗的能量比当前的路由协议要少。
{"title":"Hybrid Optimization-Based Efficient Routing Protocol for Energy Consumption Minimization in Mobile Wireless Sensor Network","authors":"V. Veerakumaran, A. Rajini","doi":"10.22247/ijcna/2022/215919","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215919","url":null,"abstract":"– Mobile Wireless Sensor Network (MWSN) is a dispersed network having autonomous sensor nodes which monitors physical occurrences or environmental variables in real-time. Most MWSNs have limited energy, so energy efficiency is critical. A node’s data will be routed by one of two standard methods: single-long-hop or short-multi-hop routing paths. The quantity of energy required to deliver a packet grows directly proportional to the packet’s travel distance in MWSN. Single-hop communication in MWSN, on the other hand, is typically relatively energy-intensive. The nodes located nearer to the sink are considerably perform well than the rest of the nodes in MWSN because of the multi-hop connection, resulting in a shorter lifespan for the MWSN. In this paper, Hybrid Optimization-based Efficient Routing Protocol (HOERP) is proposed to minimize the energy consumption in MWSN. HOERP involves grey wolf optimization and particle swarm optimization, where local search is done by grey wolf optimization and the global search optimization is done by particle swarm optimization. Utilizing the nonlinear parameters in HOERP assist in identifying the optimized cum successful route leading to consume less energy. HOERP is evaluated in NS3 using the metrics standardly used in network-oriented researches. Result highlights that HOERP consumes less energy to deliver data packets than the current routing protocols.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49245642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Region Based Secured Data Transmission Protocol for Wireless Sensor Network 基于区域的无线传感器网络安全数据传输协议
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215914
Ajay Kumar
– Outlier detection based on region is a very useful safety strategy for wireless sensor networks with a high number of scattered nodes. Developing a more effective outlier detection system in WSNs can ensure that data packets are successfully transmitted without loss or corruption. The Evolutionary Game-based Secured Clustering Protocol (EGSCP) has been created for the existing system. Those research approaches, however, failed to discover outlier activities when area leaders behave as malevolent nodes or are compromised by hackers. This is addressed in this work by introducing a novel mechanism for the reliable detection of outlier behaviors, namely Region-Based Secured Data Transmission Protocol (RSDTP). The proposed research approach ensures private rule sharing by introducing the Privacy position-aware Routing in Wireless Sensor Networks (WSNs) which use group public keys of intra-region leaders to create group signatures that are shared by all members of the region which also makes it impossible to know exact positions of area members. Thus, sharing private rules can be guaranteed while using group signatures. This study leverages Enhanced Adaptive Acknowledgment, which checks for the existence of hostile nodes before rule sharing, to enable secure rule sharing. This would take place during intraregional leaders' rule-sharing sessions. To optimize memory storage and address bandwidths/memory concerns, the rule set aggregations are executed in this study following secure rule set transfers between intra and inter-region leaders. NS2 simulations have been used for evaluations of the proposed Region-Based Secured Data Transmission Protocol (RSDTP) approach for attaining effective non-hazardous, safe, and reliable data transport processes.
-基于区域的离群点检测对于具有大量分散节点的无线传感器网络是一种非常有用的安全策略。在无线传感器网络中开发一种更有效的离群点检测系统,可以确保数据包在不丢失或损坏的情况下成功传输。针对现有系统,提出了基于进化博弈的安全聚类协议(EGSCP)。然而,这些研究方法未能发现当地区领导人表现为恶意节点或受到黑客攻击时的异常活动。这项工作通过引入一种可靠检测异常行为的新机制,即基于区域的安全数据传输协议(RSDTP)来解决这一问题。该研究方法通过在无线传感器网络(WSNs)中引入隐私位置感知路由来确保私有规则共享,该路由使用区域内领导者的组公钥创建由区域内所有成员共享的组签名,并且无法知道区域成员的确切位置。因此,在使用组签名时可以保证共享私有规则。本研究利用增强自适应确认,在规则共享之前检查敌对节点的存在,以实现安全的规则共享。这将在区域内领导人的规则分享会议期间进行。为了优化内存存储和解决带宽/内存问题,在本研究中,规则集聚合在区域内和区域间领导者之间的安全规则集传输之后执行。NS2模拟已用于评估拟议的基于区域的安全数据传输协议(RSDTP)方法,以实现有效的无危险、安全和可靠的数据传输过程。
{"title":"Region Based Secured Data Transmission Protocol for Wireless Sensor Network","authors":"Ajay Kumar","doi":"10.22247/ijcna/2022/215914","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215914","url":null,"abstract":"– Outlier detection based on region is a very useful safety strategy for wireless sensor networks with a high number of scattered nodes. Developing a more effective outlier detection system in WSNs can ensure that data packets are successfully transmitted without loss or corruption. The Evolutionary Game-based Secured Clustering Protocol (EGSCP) has been created for the existing system. Those research approaches, however, failed to discover outlier activities when area leaders behave as malevolent nodes or are compromised by hackers. This is addressed in this work by introducing a novel mechanism for the reliable detection of outlier behaviors, namely Region-Based Secured Data Transmission Protocol (RSDTP). The proposed research approach ensures private rule sharing by introducing the Privacy position-aware Routing in Wireless Sensor Networks (WSNs) which use group public keys of intra-region leaders to create group signatures that are shared by all members of the region which also makes it impossible to know exact positions of area members. Thus, sharing private rules can be guaranteed while using group signatures. This study leverages Enhanced Adaptive Acknowledgment, which checks for the existence of hostile nodes before rule sharing, to enable secure rule sharing. This would take place during intraregional leaders' rule-sharing sessions. To optimize memory storage and address bandwidths/memory concerns, the rule set aggregations are executed in this study following secure rule set transfers between intra and inter-region leaders. NS2 simulations have been used for evaluations of the proposed Region-Based Secured Data Transmission Protocol (RSDTP) approach for attaining effective non-hazardous, safe, and reliable data transport processes.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49041794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Performance of Cloud Networks Using Chaotic Black Widow Optimization Algorithm 利用混沌黑寡妇优化算法提高云网络性能
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215923
A. Mokhtar, H. Zaher, Naglaa Ragaa, Eman Mostafa
– Nowadays, the speed of the internet becomes very high and users use a lot of data from a data center, so users need to access a lot of data from the nearest place to avoid any delay. The data will be stored without any interference from users. Due to the previous reasons, Cloud Computing (CC) plays an important role in finding the best route for data to reach users by general networks without a delay and with the least energy consumption. To achieve scalability, protocols are used and developed for networks for a suitable performance in the cloud computing networks. In this paper, a natural-inspired protocol is used in cloud networks to find a good routing, this protocol is called Chaotic Black Widow Optimization Algorithm (CBWOA). Some natural characteristics of the routing strategy are inspired by the black widow optimization algorithm. Taguchi's methods were used for tuning parameters of CBWOA based on orthogonal array experiments. CBWOA is applied with three constraints to measure two factors called energy consumption and throughput by finding best path direction in cloud Computing networks. CBWOA is evaluated in an experimental cloud using the current routing protocols against old routing protocols of the performance network. Finally, the best route in cloud networks is founded successfully and the performance of the developed protocol is associated with two factors, the first one is maximizing (the throughput with efficiency 93.4921% and the Packet delivery ratio with efficiency 90.3087%) and the second one is minimizing (the delay with efficiency 62.1788% and the energy consumed with efficiency 51.1406%).
–如今,互联网的速度变得非常快,用户使用数据中心的大量数据,因此用户需要从最近的地方访问大量数据,以避免任何延迟。数据的存储不会受到用户的任何干扰。由于上述原因,云计算(CC)在寻找数据通过通用网络无延迟、能耗最小地到达用户的最佳路径方面发挥着重要作用。为了实现可扩展性,在云计算网络中使用和开发用于网络的协议以获得合适的性能。本文将一种受自然启发的协议用于云网络中,以找到一个良好的路由,该协议称为混沌黑寡妇优化算法(CBWOA)。路由策略的一些自然特性受到黑寡妇优化算法的启发。基于正交阵列实验,采用田口方法对CBWOA的参数进行了调整。CBWOA具有三个约束条件,通过在云计算网络中寻找最佳路径方向来测量两个因素,即能耗和吞吐量。CBWOA在实验云中使用当前路由协议与性能网络的旧路由协议进行评估。最后,成功地建立了云网络中的最佳路由,所开发的协议的性能与两个因素有关,第一个因素是最大化(效率为93.4921%的吞吐量和效率为90.3087%的分组传送率),第二个因素是最小化(效率为62.1788%的延迟和51.1406%的能耗)。
{"title":"Improved Performance of Cloud Networks Using Chaotic Black Widow Optimization Algorithm","authors":"A. Mokhtar, H. Zaher, Naglaa Ragaa, Eman Mostafa","doi":"10.22247/ijcna/2022/215923","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215923","url":null,"abstract":"– Nowadays, the speed of the internet becomes very high and users use a lot of data from a data center, so users need to access a lot of data from the nearest place to avoid any delay. The data will be stored without any interference from users. Due to the previous reasons, Cloud Computing (CC) plays an important role in finding the best route for data to reach users by general networks without a delay and with the least energy consumption. To achieve scalability, protocols are used and developed for networks for a suitable performance in the cloud computing networks. In this paper, a natural-inspired protocol is used in cloud networks to find a good routing, this protocol is called Chaotic Black Widow Optimization Algorithm (CBWOA). Some natural characteristics of the routing strategy are inspired by the black widow optimization algorithm. Taguchi's methods were used for tuning parameters of CBWOA based on orthogonal array experiments. CBWOA is applied with three constraints to measure two factors called energy consumption and throughput by finding best path direction in cloud Computing networks. CBWOA is evaluated in an experimental cloud using the current routing protocols against old routing protocols of the performance network. Finally, the best route in cloud networks is founded successfully and the performance of the developed protocol is associated with two factors, the first one is maximizing (the throughput with efficiency 93.4921% and the Packet delivery ratio with efficiency 90.3087%) and the second one is minimizing (the delay with efficiency 62.1788% and the energy consumed with efficiency 51.1406%).","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49127578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G Network: techniques to Increase Quality of Service and Quality of Experience 5G网络:提高服务质量和体验质量的技术
Q4 Computer Science Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214508
N. Khan
– The rapid growth of interconnected networks and devices inevitably causes the rise of traffic demand and thus pushes the technologies like long-term evolution-Advanced (LTE-A) and mobile multihop relay WiMAX networks technology to move into the fifth-generation (5G). The 5G network was envisioned to be built to encounter the fundamental challenges of quality of services in existing networks, such as allowing higher data rates, enhanced end-user quality of experience, reduced end-to-end latency, lower energy consumption, and higher traffic capacity. In order to satisfy and achieve the vision of the 5G network, extensive debates are in progress about the numerous techniques to be adapted. The objective of this study is to analyze various techniques for 5G networks to achieve the high enhance Quality of Service (QoS) and Quality of Experience (QoE) for users. Moreover, this paper also discussed several combinations of techniques for the upcoming 5G network, such as mmWave with Massive MIMO, D2D with SDN, D2D with mmWave, and D2D with Machine-to-machine communication and NFV and SDN hybrid. This study will be a significant endeavor in choosing possible techniques for 5G networks and further investigating various combinations of such techniques for future works. To make suitable techniques for the emerging 5G network, guidelines and challenges are highlighted to modify the existing techniques.
–互联网络和设备的快速增长不可避免地会导致流量需求的上升,从而推动长期演进高级(LTE-A)和移动多跳中继WiMAX网络技术等技术进入第五代(5G)。5G网络的建设旨在应对现有网络中服务质量的根本挑战,例如允许更高的数据速率、增强最终用户体验质量、减少端到端延迟、降低能耗和更高的流量。为了满足和实现5G网络的愿景,关于要适应的众多技术的广泛争论正在进行中。本研究的目的是分析5G网络的各种技术,以实现用户的高增强服务质量(QoS)和体验质量(QoE)。此外,本文还讨论了即将到来的5G网络的几种技术组合,如毫米波与大规模MIMO、D2D与SDN、D2D和毫米波,以及D2D与机器对机器通信以及NFV和SDN混合。这项研究将是为5G网络选择可能的技术,并为未来的工作进一步研究这些技术的各种组合的重要努力。为了为新兴的5G网络制定合适的技术,强调了修改现有技术的指导方针和挑战。
{"title":"5G Network: techniques to Increase Quality of Service and Quality of Experience","authors":"N. Khan","doi":"10.22247/ijcna/2022/214508","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214508","url":null,"abstract":"– The rapid growth of interconnected networks and devices inevitably causes the rise of traffic demand and thus pushes the technologies like long-term evolution-Advanced (LTE-A) and mobile multihop relay WiMAX networks technology to move into the fifth-generation (5G). The 5G network was envisioned to be built to encounter the fundamental challenges of quality of services in existing networks, such as allowing higher data rates, enhanced end-user quality of experience, reduced end-to-end latency, lower energy consumption, and higher traffic capacity. In order to satisfy and achieve the vision of the 5G network, extensive debates are in progress about the numerous techniques to be adapted. The objective of this study is to analyze various techniques for 5G networks to achieve the high enhance Quality of Service (QoS) and Quality of Experience (QoE) for users. Moreover, this paper also discussed several combinations of techniques for the upcoming 5G network, such as mmWave with Massive MIMO, D2D with SDN, D2D with mmWave, and D2D with Machine-to-machine communication and NFV and SDN hybrid. This study will be a significant endeavor in choosing possible techniques for 5G networks and further investigating various combinations of such techniques for future works. To make suitable techniques for the emerging 5G network, guidelines and challenges are highlighted to modify the existing techniques.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47552561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design a hybrid Optimization and Homomorphic Encryption for Securing Data in a Cloud Environment 云环境下数据安全的混合优化和同态加密设计
Q4 Computer Science Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214502
Mercy Joseph, Gobi Mohan
– Cloud Computing (CC) is denoted as web-based computing that offers devices or users a shared pool of information, resources, or software. It permits small companies and end-users for making the use of different computational resources such as software, storage, and processing ability offered via other companies. But the main problem in CC is data security because of malware and attacks. So this paper developed a novel Hybrid Bat and Cuckoo-based Pallier Homomorphic Encryption (HBC-PHE) scheme for enhancing the data security of the cloud from malware and attacks. Initially, collected datasets are stored in the cloud using the python tool, and collected datasets are transferred into the developed HBC-PHE framework. At first, generate the key for each dataset and separate the private key for all datasets. Moreover, convert the plain text into ciphertext using the bat and cuckoo fitness function in PHE. Finally, cloud-stored data are encrypted successfully and the attained performance outcomes of the developed framework are associated with other existing techniques in terms of confidential rate, decryption time, encryption time, efficiency, and throughput. Additionally, the developed model gained a throughput of 654Kbps, decryption time of 0.05ms, encryption time of 0.08ms, and efficiency of 98.34% for 500kb. As well, the designed model gained a confidential rate of 98.7% and a computation time of 0.03s for using a 500 kb.
–云计算(CC)是指基于网络的计算,为设备或用户提供共享的信息、资源或软件池。它允许小公司和最终用户使用不同的计算资源,如软件、存储和其他公司提供的处理能力。但由于恶意软件和攻击,CC中的主要问题是数据安全。因此,本文开发了一种新的基于蝙蝠和布谷鸟混合的Pallier同态加密(HBC-PHE)方案,以增强云的数据安全性,使其免受恶意软件和攻击。最初,收集到的数据集使用python工具存储在云中,收集的数据集被转移到开发的HBC-PHE框架中。首先,为每个数据集生成密钥,并为所有数据集分离私钥。此外,使用PHE中的bat和杜鹃适应度函数将明文转换为密文。最后,云存储的数据被成功加密,并且所开发的框架在保密率、解密时间、加密时间、效率和吞吐量方面与其他现有技术相关联。此外,该模型的吞吐量为654Kbps,解密时间为0.05ms,加密时间为0.08ms,500kb的效率为98.34%。此外,所设计的模型在使用500kb时获得了98.7%的机密率和0.03s的计算时间。
{"title":"Design a hybrid Optimization and Homomorphic Encryption for Securing Data in a Cloud Environment","authors":"Mercy Joseph, Gobi Mohan","doi":"10.22247/ijcna/2022/214502","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214502","url":null,"abstract":"– Cloud Computing (CC) is denoted as web-based computing that offers devices or users a shared pool of information, resources, or software. It permits small companies and end-users for making the use of different computational resources such as software, storage, and processing ability offered via other companies. But the main problem in CC is data security because of malware and attacks. So this paper developed a novel Hybrid Bat and Cuckoo-based Pallier Homomorphic Encryption (HBC-PHE) scheme for enhancing the data security of the cloud from malware and attacks. Initially, collected datasets are stored in the cloud using the python tool, and collected datasets are transferred into the developed HBC-PHE framework. At first, generate the key for each dataset and separate the private key for all datasets. Moreover, convert the plain text into ciphertext using the bat and cuckoo fitness function in PHE. Finally, cloud-stored data are encrypted successfully and the attained performance outcomes of the developed framework are associated with other existing techniques in terms of confidential rate, decryption time, encryption time, efficiency, and throughput. Additionally, the developed model gained a throughput of 654Kbps, decryption time of 0.05ms, encryption time of 0.08ms, and efficiency of 98.34% for 500kb. As well, the designed model gained a confidential rate of 98.7% and a computation time of 0.03s for using a 500 kb.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49537086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-Objective Fault Tolerance Model for Scientific Workflow Scheduling on Cloud Computing 云计算下科学工作流调度的多目标容错模型
Q4 Computer Science Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214505
S. Anuradha, P. Kanmani
– Cloud computing is used for large-scale applications. Therefore, a lot of organizations and industries are moving their data to the cloud. Nevertheless, cloud computing might have maximum failure rates because of the great number of servers and parts with a high workload. Reducing the false in scheduling is a challenging task. Hence, in this study, an efficient multi-objective fault detector strategy using an improved Squirrel Optimization Algorithm (ISOA) in cloud computing is proposed. This method can effectively reduce energy consumption, makespan, and total cost, while also tolerating errors when planning scientific workflows. To increase the detection accuracy of failures, the Active Fault Tolerance Mechanism (PFTM) is used. Similarly, the reactive fault tolerance mechanism (RFTM) is used for processor failures. The efficiency of the proposed approach is analysed based on various measurements and performance compared to other approaches.
—云计算主要用于大规模应用。因此,许多组织和行业正在将他们的数据迁移到云中。然而,云计算可能有最大的故障率,因为大量的服务器和具有高工作负载的部件。减少调度中的错误是一项具有挑战性的任务。为此,本文提出了一种基于改进的云计算松鼠优化算法(ISOA)的高效多目标故障检测策略。这种方法可以有效地降低能耗、完工时间和总成本,同时在规划科学工作流程时也可以容忍错误。为了提高故障的检测精度,采用了主动容错机制(PFTM)。类似地,反应性容错机制(RFTM)用于处理器故障。基于各种测量和性能,与其他方法进行了比较,分析了该方法的效率。
{"title":"Multi-Objective Fault Tolerance Model for Scientific Workflow Scheduling on Cloud Computing","authors":"S. Anuradha, P. Kanmani","doi":"10.22247/ijcna/2022/214505","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214505","url":null,"abstract":"– Cloud computing is used for large-scale applications. Therefore, a lot of organizations and industries are moving their data to the cloud. Nevertheless, cloud computing might have maximum failure rates because of the great number of servers and parts with a high workload. Reducing the false in scheduling is a challenging task. Hence, in this study, an efficient multi-objective fault detector strategy using an improved Squirrel Optimization Algorithm (ISOA) in cloud computing is proposed. This method can effectively reduce energy consumption, makespan, and total cost, while also tolerating errors when planning scientific workflows. To increase the detection accuracy of failures, the Active Fault Tolerance Mechanism (PFTM) is used. Similarly, the reactive fault tolerance mechanism (RFTM) is used for processor failures. The efficiency of the proposed approach is analysed based on various measurements and performance compared to other approaches.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45009594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks 适用于移动社交云网络的孤立自适应用户配置文件匹配
Q4 Computer Science Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214506
M. Gobi
– Profile matching (PM) is a crucial method in cloud-based applications including Health Care and Social Networks (HC-SNs). In Mobile Social Cloud Networks (MSCNs), matching user profiles while maintaining privacy is a demanding challenge that has garnered greater attention in recent days. This article represents a new scheme called Modified Cipher Text based Policy Encryption Scheme (MCT-PES), proposed for Solitude Adaptable User Profile Matching for MSCNs (SA-UPM) using Homomorphic Encryption (Ho-En) technique for multiple recipients. In this module, a client submits a Priority-Profile (PP) and searches decentralized MSCNs for people with MP. In this method, neither the participant's profile nor the PP given by the participant is revealed. Furthermore, a Secure Transmission Medium (STM) may be formed between the pair of correctly matched users (MUs). Initially, it ensures verifiability, ensuring that no participant may deceive the initiator by providing an incorrect matching result. Then, the matched profile pair may be used it to create a STM that can withstand an eavesdropping attempt. Furthermore, the mismatched user may be promptly ruled out. Additionally, just a limited exchange between the originator and MUs are required since the MUs can determine the similar outcome without the assistance of the originator, which is beneficial for lowering computational problems and costs.
–配置文件匹配(PM)是基于云的应用程序中的一种关键方法,包括医疗保健和社交网络(HC SN)。在移动社交云网络(MSCN)中,在维护隐私的同时匹配用户档案是一项艰巨的挑战,最近几天引起了更多关注。本文提出了一种新的方案,称为基于改进密码文本的策略加密方案(MCT-PES),用于MSCN的孤立自适应用户配置文件匹配(SA-UPM),该方案使用同态加密(Ho-En)技术用于多个接收方。在该模块中,客户端提交优先级配置文件(PP),并在分散的MSCN中搜索患有MP的人。在该方法中,既不显示参与者的配置文件,也不显示参与者提供的PP。此外,可以在一对正确匹配的用户(MU)之间形成安全传输介质(STM)。最初,它确保了可验证性,确保没有参与者通过提供不正确的匹配结果来欺骗发起人。然后,匹配的配置文件对可以用于创建能够承受窃听尝试的STM。此外,可以立即排除不匹配的用户。此外,只需要发起者和MU之间的有限交换,因为MU可以在没有发起者帮助的情况下确定类似的结果,这有利于降低计算问题和成本。
{"title":"Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks","authors":"M. Gobi","doi":"10.22247/ijcna/2022/214506","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214506","url":null,"abstract":"– Profile matching (PM) is a crucial method in cloud-based applications including Health Care and Social Networks (HC-SNs). In Mobile Social Cloud Networks (MSCNs), matching user profiles while maintaining privacy is a demanding challenge that has garnered greater attention in recent days. This article represents a new scheme called Modified Cipher Text based Policy Encryption Scheme (MCT-PES), proposed for Solitude Adaptable User Profile Matching for MSCNs (SA-UPM) using Homomorphic Encryption (Ho-En) technique for multiple recipients. In this module, a client submits a Priority-Profile (PP) and searches decentralized MSCNs for people with MP. In this method, neither the participant's profile nor the PP given by the participant is revealed. Furthermore, a Secure Transmission Medium (STM) may be formed between the pair of correctly matched users (MUs). Initially, it ensures verifiability, ensuring that no participant may deceive the initiator by providing an incorrect matching result. Then, the matched profile pair may be used it to create a STM that can withstand an eavesdropping attempt. Furthermore, the mismatched user may be promptly ruled out. Additionally, just a limited exchange between the originator and MUs are required since the MUs can determine the similar outcome without the assistance of the originator, which is beneficial for lowering computational problems and costs.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41390809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Model for Smart Home Network Security 基于区块链的智能家庭网络安全模型
Q4 Computer Science Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214509
Abdualrahman Johari, R. Alsaqour
– Network security is a vast topic that combines processes, devices, and technologies. Network security is the group of rules and configurations. This designed to protect the information and networks' integrity, accessibility, and confidentiality using software and hardware. The network nowadays has become complex, which is changing the threat environment. Similarly, smart homes are also becoming prone to security threats. Due to that, ensuring network security is very important. The vulnerabilities of the smart home network can exist in many areas, including users, location, data, and applications. Some smart devices in smart homes may lack system hardening and can have hardcoded passwords, or the passwords can be found without any encryption inside the device or the software. Security of the smart home network is a high priority of the connected devices so that hackers do not get access to sensitive and personal data. Otherwise, this may risk the entire network of the smart home. This research will provide a model to analyze various security concerns of the smart home network. For this research, a qualitative method such as a case study analysis will be done for conducting this research study. In addition, relevant information through the secondary data collection method will be collected. Investigation of various security threats related to smart home networks will be performed, and Blockchain Technology will be used technologies to mitigate the security issues and secure and protect the smart home network secured and protected. In this research, the novel, decentralized, and innovative approach to blockchain technology will be presented, which will be used to enhance the security architecture of the smart home network.
网络安全是一个集流程、设备和技术于一体的宏大课题。网络安全是一组规则和配置。这是为了利用软件和硬件来保护信息和网络的完整性、可访问性和机密性。当今网络日趋复杂,威胁环境正在发生变化。同样,智能家居也容易受到安全威胁。因此,确保网络安全是非常重要的。智能家居网络的漏洞可能存在于许多领域,包括用户、位置、数据和应用。智能家居中的一些智能设备可能缺乏系统加固,并且可能具有硬编码密码,或者可以在设备或软件内部没有任何加密的情况下找到密码。智能家居网络的安全性是连接设备的重中之重,这样黑客就无法访问敏感和个人数据。否则,这可能会危及整个智能家居的网络。本研究将提供一个模型来分析智能家居网络的各种安全问题。对于这项研究,定性的方法,如一个案例研究分析将做进行这项研究。此外,将通过二次数据收集方法收集相关信息。将对与智能家居网络相关的各种安全威胁进行调查,并使用区块链技术来缓解安全问题,并保护智能家居网络的安全。在本研究中,将提出一种新颖的、分散的、创新的区块链技术方法,用于增强智能家庭网络的安全架构。
{"title":"Blockchain-Based Model for Smart Home Network Security","authors":"Abdualrahman Johari, R. Alsaqour","doi":"10.22247/ijcna/2022/214509","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214509","url":null,"abstract":"– Network security is a vast topic that combines processes, devices, and technologies. Network security is the group of rules and configurations. This designed to protect the information and networks' integrity, accessibility, and confidentiality using software and hardware. The network nowadays has become complex, which is changing the threat environment. Similarly, smart homes are also becoming prone to security threats. Due to that, ensuring network security is very important. The vulnerabilities of the smart home network can exist in many areas, including users, location, data, and applications. Some smart devices in smart homes may lack system hardening and can have hardcoded passwords, or the passwords can be found without any encryption inside the device or the software. Security of the smart home network is a high priority of the connected devices so that hackers do not get access to sensitive and personal data. Otherwise, this may risk the entire network of the smart home. This research will provide a model to analyze various security concerns of the smart home network. For this research, a qualitative method such as a case study analysis will be done for conducting this research study. In addition, relevant information through the secondary data collection method will be collected. Investigation of various security threats related to smart home networks will be performed, and Blockchain Technology will be used technologies to mitigate the security issues and secure and protect the smart home network secured and protected. In this research, the novel, decentralized, and innovative approach to blockchain technology will be presented, which will be used to enhance the security architecture of the smart home network.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48080551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Computer Networks and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1