首页 > 最新文献

International Journal of Computer Networks and Applications最新文献

英文 中文
Multi-Criteria Optimization Based VM Placement Strategy to Mitigate Co-Location Risks in Data Centers 基于多准则优化的虚拟机布局策略缓解数据中心异地风险
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215912
N. Chandrakala, Vamsidhar Enireddy
– Cloud providers generally run one or more Virtual Machine (VM) instances on the same physical machine. Though it increases data center utilization, it exposes VM to a co-location attack. VM placement and migration are the two strategies adopted for mitigating co-locations. Current methods for VM placement or VM migration consider only security as decision criteria and do not consider other factors like Quality-of-Service degradation, data center utilization, etc. This work proposes a placement and migration strategy for mitigation of co-location attacks with joint consideration of multi objectives like QoS, data center utilization, energy consumption, and security risks. A security-driven multi-criteria optimization -based VM placement policy is proposed. A joint consideration of multi objective performance optimization along with co-location security risk minimization is done to design a novel VM placement policy based on user categorization. The policy can reduce the likelihood of co-location target VM with attacker VM without much degradation to the performance of VM and data center utilization. The solution mitigates co-location risks without much compromise to the performance of VM and data center resource utilization. The co-residence risk is mitigated by the categorization of users into three levels i.e. unlabeled, risky, and safe, and physical machines into two groups as safe and unsafe. The PMs available in data center is grouped into three different VM placement policies, they are undecided pool, safe pool and unsafe pool.
–云提供商通常在同一物理机器上运行一个或多个虚拟机(VM)实例。尽管它提高了数据中心的利用率,但它使VM暴露在同一位置的攻击之下。虚拟机的放置和迁移是两种用于减少异地的策略。当前的虚拟机放置或迁移方法只考虑安全性作为决策标准,而不考虑服务质量下降、数据中心利用率等其他因素。这项工作提出了一种放置和迁移策略,用于缓解异地攻击,同时考虑QoS、数据中心使用率、能耗等多个目标,以及安全风险。提出了一种基于安全驱动的多准则优化虚拟机布局策略。将多目标性能优化与异地安全风险最小化相结合,设计了一种基于用户分类的虚拟机布局策略。该策略可以降低目标虚拟机与攻击者虚拟机共存的可能性,而不会对虚拟机的性能和数据中心利用率造成太大的降低。该解决方案在不影响虚拟机性能和数据中心资源利用率的情况下,降低了共处一地的风险。通过将用户分为三个级别(即未标记、有风险和安全),并将物理机器分为两组(即安全和不安全),可以降低共住风险。数据中心中可用的VM分为三种不同的VM放置策略,它们是未决定池、安全池和不安全池。
{"title":"Multi-Criteria Optimization Based VM Placement Strategy to Mitigate Co-Location Risks in Data Centers","authors":"N. Chandrakala, Vamsidhar Enireddy","doi":"10.22247/ijcna/2022/215912","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215912","url":null,"abstract":"– Cloud providers generally run one or more Virtual Machine (VM) instances on the same physical machine. Though it increases data center utilization, it exposes VM to a co-location attack. VM placement and migration are the two strategies adopted for mitigating co-locations. Current methods for VM placement or VM migration consider only security as decision criteria and do not consider other factors like Quality-of-Service degradation, data center utilization, etc. This work proposes a placement and migration strategy for mitigation of co-location attacks with joint consideration of multi objectives like QoS, data center utilization, energy consumption, and security risks. A security-driven multi-criteria optimization -based VM placement policy is proposed. A joint consideration of multi objective performance optimization along with co-location security risk minimization is done to design a novel VM placement policy based on user categorization. The policy can reduce the likelihood of co-location target VM with attacker VM without much degradation to the performance of VM and data center utilization. The solution mitigates co-location risks without much compromise to the performance of VM and data center resource utilization. The co-residence risk is mitigated by the categorization of users into three levels i.e. unlabeled, risky, and safe, and physical machines into two groups as safe and unsafe. The PMs available in data center is grouped into three different VM placement policies, they are undecided pool, safe pool and unsafe pool.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46228020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT) 面向低功耗有损网络(RPL)的自适应路由协议,实现水下物联网(IoUT)的可靠节能通信
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215918
R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran
– Internet of Underwater Things (IoUT) is emerging as a powerful technology to explore underwater things. Reliable communication between underwater things is a significant challenge compared to communication at the surface, notably the unique characteristics imposed by the underwater environment, such as water currents, noisy scenarios, and limited resources. Several routing protocols have been suggested to overcome the challenges in IoUT. The previous works mainly focus either on improving the reliability or energy efficiency of the routing process. Concentrating on both parameters makes the routing process too complex with substantial overhead. Routing techniques face challenges in solving the noise and water current issues in the IoUT environment. The proposed work utilizes the potential of the Routing Protocol for Low Power and Lossy Networks (RPL) on IoUT communication by enhancing its Objective Function (OF) to resolve the routing in the underwater environment. The proposed Underwater Adaptive RPL (UA-RPL) turns the inefficient DODAG construction into an efficient under noisy environment by extending DIO message features. Numerous neighboring nodes receive the extended DIO message, and the nodes that fit into the safety zone are decided according to the multiple routing metrics, such as hop count, ETX, and Energy factor. Entire network traffic is partitioned through multiple parent nodes with the best rank values and attains an energy-balancing routing over underwater things. It helps to improve the network lifetime without compromising communication reliability. The proposed work is evaluated to show its advantages over the underwater environment. The simulation results show that the UA-RPL delivers high performance when varying the underwater things from 15 to 60. Moreover, it outperforms the existing schemes under the IoUT environment.
-水下物联网(IoUT)正在成为探索水下事物的强大技术。与水面通信相比,水下物体之间的可靠通信是一个重大挑战,特别是水下环境所带来的独特特性,如水流、嘈杂场景和有限的资源。已经提出了几种路由协议来克服IoUT中的挑战。以往的工作主要集中在提高路由过程的可靠性或能效方面。同时关注这两个参数会使路由过程过于复杂,开销很大。布线技术在解决IoUT环境中的噪声和水流问题方面面临挑战。本文通过增强RPL的目标函数(of)来解决水下环境下的路由问题,充分利用了低功耗损耗网络路由协议(RPL)在IoUT通信中的潜力。本文提出的水下自适应RPL (UA-RPL)通过扩展DIO消息特征,将低效率的DODAG构造转变为噪声环境下的高效DODAG构造。许多相邻节点接收扩展的DIO消息,并根据多个路由指标(如跳数、ETX和能量因子)决定适合安全区域的节点。整个网络流量通过多个具有最佳rank值的父节点进行分区,并在水下事物上实现能量均衡路由。它有助于在不影响通信可靠性的情况下提高网络的生存期。对所提出的工作进行了评估,以显示其在水下环境中的优势。仿真结果表明,UA-RPL在15 ~ 60倍频的水下环境下具有良好的性能。此外,它在IoUT环境下优于现有方案。
{"title":"Towards an Adaptive Routing Protocol for Low Power and Lossy Networks (RPL) for Reliable and Energy Efficient Communication in the Internet of Underwater Things (IoUT)","authors":"R. Saravanan, T. Sakthivel, P. Karpagam, K. Gunasekaran","doi":"10.22247/ijcna/2022/215918","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215918","url":null,"abstract":"– Internet of Underwater Things (IoUT) is emerging as a powerful technology to explore underwater things. Reliable communication between underwater things is a significant challenge compared to communication at the surface, notably the unique characteristics imposed by the underwater environment, such as water currents, noisy scenarios, and limited resources. Several routing protocols have been suggested to overcome the challenges in IoUT. The previous works mainly focus either on improving the reliability or energy efficiency of the routing process. Concentrating on both parameters makes the routing process too complex with substantial overhead. Routing techniques face challenges in solving the noise and water current issues in the IoUT environment. The proposed work utilizes the potential of the Routing Protocol for Low Power and Lossy Networks (RPL) on IoUT communication by enhancing its Objective Function (OF) to resolve the routing in the underwater environment. The proposed Underwater Adaptive RPL (UA-RPL) turns the inefficient DODAG construction into an efficient under noisy environment by extending DIO message features. Numerous neighboring nodes receive the extended DIO message, and the nodes that fit into the safety zone are decided according to the multiple routing metrics, such as hop count, ETX, and Energy factor. Entire network traffic is partitioned through multiple parent nodes with the best rank values and attains an energy-balancing routing over underwater things. It helps to improve the network lifetime without compromising communication reliability. The proposed work is evaluated to show its advantages over the underwater environment. The simulation results show that the UA-RPL delivers high performance when varying the underwater things from 15 to 60. Moreover, it outperforms the existing schemes under the IoUT environment.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41580410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Route Selection Using Hill Climbing Based Red Deer Algorithm in Vehicular Ad-Hoc Networks to Improve Energy Efficiency 基于爬山马鹿算法的车辆自组织网络优化路径选择提高能源效率
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215915
K. Giridhar, C. Anbuananth, N. Krishnaraj
– One of the effective technologies that have been found useful in a number of real-time applications to increase the safety of roadways is called a vehicular ad hoc network, or VANET for short. In spite of the many advantages of the VANET, one of the most difficult aspects of this network is still the creation of an efficient routing protocol. The fact that VANET involves dynamic factors in its routing process makes it a difficult task to do successfully. It is possible to build a wide variety of route selection strategies in order to make efficient use of the available networking resources and to improve the efficacy of the routing. To achieve a higher level of resource utilization within VANET, the development of an efficient routing protocol is an absolute necessity. As a result of this impetus, the purpose of this research is to present an energy efficient hill climbing based red deer algorithm known as EEHC-RDA for use as an optimal route selection technique in VANET. In order to increase both the system's lifetime and its energy efficiency, the EEHC-RDA technique that has been presented prioritizes the selection of the most effective routes to the final destination. In addition, the EEHC-RDA method improves the convergence rate since it combines the mating behaviour of red deer with the hill climbing (HC) ideas. In addition to this, the EEHC-RDA method computes a fitness function for selecting the best possible routes, which takes into account a variety of input factors. In order to show that the EEHC-RDA approach offers a higher level of performance, a broad range of simulations are carried out. The outcomes of these simulations show that the suggested model has an enhanced performance in contrast to the existing methods in terms of a wide variety of different metrics, which demonstrates that the present state of approaches is not optimal.
在许多实时应用中,人们发现一种有效的技术可以提高道路的安全性,这种技术被称为车辆自组织网络,简称VANET。尽管VANET有许多优点,但该网络最困难的方面之一仍然是创建有效的路由协议。VANET在其路由过程中涉及到动态因素,这使得它很难成功完成。为了有效地利用现有的网络资源,提高路由的有效性,可以建立多种路由选择策略。为了在VANET中实现更高水平的资源利用率,开发有效的路由协议是绝对必要的。基于这种动力,本研究的目的是提出一种高效的基于马鹿的爬坡算法,称为EEHC-RDA,用于VANET的最优路线选择技术。为了提高系统的使用寿命和能源效率,EEHC-RDA技术优先选择通往最终目的地的最有效路线。此外,EEHC-RDA方法结合了马鹿的交配行为和爬山思想,提高了收敛速度。除此之外,EEHC-RDA方法还计算了一个适应度函数,用于选择考虑各种输入因素的最佳可能路径。为了证明EEHC-RDA方法提供了更高水平的性能,进行了广泛的仿真。这些模拟结果表明,与现有方法相比,所建议的模型在各种不同的指标方面具有增强的性能,这表明目前的方法状态不是最优的。
{"title":"Optimal Route Selection Using Hill Climbing Based Red Deer Algorithm in Vehicular Ad-Hoc Networks to Improve Energy Efficiency","authors":"K. Giridhar, C. Anbuananth, N. Krishnaraj","doi":"10.22247/ijcna/2022/215915","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215915","url":null,"abstract":"– One of the effective technologies that have been found useful in a number of real-time applications to increase the safety of roadways is called a vehicular ad hoc network, or VANET for short. In spite of the many advantages of the VANET, one of the most difficult aspects of this network is still the creation of an efficient routing protocol. The fact that VANET involves dynamic factors in its routing process makes it a difficult task to do successfully. It is possible to build a wide variety of route selection strategies in order to make efficient use of the available networking resources and to improve the efficacy of the routing. To achieve a higher level of resource utilization within VANET, the development of an efficient routing protocol is an absolute necessity. As a result of this impetus, the purpose of this research is to present an energy efficient hill climbing based red deer algorithm known as EEHC-RDA for use as an optimal route selection technique in VANET. In order to increase both the system's lifetime and its energy efficiency, the EEHC-RDA technique that has been presented prioritizes the selection of the most effective routes to the final destination. In addition, the EEHC-RDA method improves the convergence rate since it combines the mating behaviour of red deer with the hill climbing (HC) ideas. In addition to this, the EEHC-RDA method computes a fitness function for selecting the best possible routes, which takes into account a variety of input factors. In order to show that the EEHC-RDA approach offers a higher level of performance, a broad range of simulations are carried out. The outcomes of these simulations show that the suggested model has an enhanced performance in contrast to the existing methods in terms of a wide variety of different metrics, which demonstrates that the present state of approaches is not optimal.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48580871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Region Based Secured Data Transmission Protocol for Wireless Sensor Network 基于区域的无线传感器网络安全数据传输协议
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215914
Ajay Kumar
– Outlier detection based on region is a very useful safety strategy for wireless sensor networks with a high number of scattered nodes. Developing a more effective outlier detection system in WSNs can ensure that data packets are successfully transmitted without loss or corruption. The Evolutionary Game-based Secured Clustering Protocol (EGSCP) has been created for the existing system. Those research approaches, however, failed to discover outlier activities when area leaders behave as malevolent nodes or are compromised by hackers. This is addressed in this work by introducing a novel mechanism for the reliable detection of outlier behaviors, namely Region-Based Secured Data Transmission Protocol (RSDTP). The proposed research approach ensures private rule sharing by introducing the Privacy position-aware Routing in Wireless Sensor Networks (WSNs) which use group public keys of intra-region leaders to create group signatures that are shared by all members of the region which also makes it impossible to know exact positions of area members. Thus, sharing private rules can be guaranteed while using group signatures. This study leverages Enhanced Adaptive Acknowledgment, which checks for the existence of hostile nodes before rule sharing, to enable secure rule sharing. This would take place during intraregional leaders' rule-sharing sessions. To optimize memory storage and address bandwidths/memory concerns, the rule set aggregations are executed in this study following secure rule set transfers between intra and inter-region leaders. NS2 simulations have been used for evaluations of the proposed Region-Based Secured Data Transmission Protocol (RSDTP) approach for attaining effective non-hazardous, safe, and reliable data transport processes.
-基于区域的离群点检测对于具有大量分散节点的无线传感器网络是一种非常有用的安全策略。在无线传感器网络中开发一种更有效的离群点检测系统,可以确保数据包在不丢失或损坏的情况下成功传输。针对现有系统,提出了基于进化博弈的安全聚类协议(EGSCP)。然而,这些研究方法未能发现当地区领导人表现为恶意节点或受到黑客攻击时的异常活动。这项工作通过引入一种可靠检测异常行为的新机制,即基于区域的安全数据传输协议(RSDTP)来解决这一问题。该研究方法通过在无线传感器网络(WSNs)中引入隐私位置感知路由来确保私有规则共享,该路由使用区域内领导者的组公钥创建由区域内所有成员共享的组签名,并且无法知道区域成员的确切位置。因此,在使用组签名时可以保证共享私有规则。本研究利用增强自适应确认,在规则共享之前检查敌对节点的存在,以实现安全的规则共享。这将在区域内领导人的规则分享会议期间进行。为了优化内存存储和解决带宽/内存问题,在本研究中,规则集聚合在区域内和区域间领导者之间的安全规则集传输之后执行。NS2模拟已用于评估拟议的基于区域的安全数据传输协议(RSDTP)方法,以实现有效的无危险、安全和可靠的数据传输过程。
{"title":"Region Based Secured Data Transmission Protocol for Wireless Sensor Network","authors":"Ajay Kumar","doi":"10.22247/ijcna/2022/215914","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215914","url":null,"abstract":"– Outlier detection based on region is a very useful safety strategy for wireless sensor networks with a high number of scattered nodes. Developing a more effective outlier detection system in WSNs can ensure that data packets are successfully transmitted without loss or corruption. The Evolutionary Game-based Secured Clustering Protocol (EGSCP) has been created for the existing system. Those research approaches, however, failed to discover outlier activities when area leaders behave as malevolent nodes or are compromised by hackers. This is addressed in this work by introducing a novel mechanism for the reliable detection of outlier behaviors, namely Region-Based Secured Data Transmission Protocol (RSDTP). The proposed research approach ensures private rule sharing by introducing the Privacy position-aware Routing in Wireless Sensor Networks (WSNs) which use group public keys of intra-region leaders to create group signatures that are shared by all members of the region which also makes it impossible to know exact positions of area members. Thus, sharing private rules can be guaranteed while using group signatures. This study leverages Enhanced Adaptive Acknowledgment, which checks for the existence of hostile nodes before rule sharing, to enable secure rule sharing. This would take place during intraregional leaders' rule-sharing sessions. To optimize memory storage and address bandwidths/memory concerns, the rule set aggregations are executed in this study following secure rule set transfers between intra and inter-region leaders. NS2 simulations have been used for evaluations of the proposed Region-Based Secured Data Transmission Protocol (RSDTP) approach for attaining effective non-hazardous, safe, and reliable data transport processes.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49041794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved Performance of Cloud Networks Using Chaotic Black Widow Optimization Algorithm 利用混沌黑寡妇优化算法提高云网络性能
Q4 Computer Science Pub Date : 2022-10-01 DOI: 10.22247/ijcna/2022/215923
A. Mokhtar, H. Zaher, Naglaa Ragaa, Eman Mostafa
– Nowadays, the speed of the internet becomes very high and users use a lot of data from a data center, so users need to access a lot of data from the nearest place to avoid any delay. The data will be stored without any interference from users. Due to the previous reasons, Cloud Computing (CC) plays an important role in finding the best route for data to reach users by general networks without a delay and with the least energy consumption. To achieve scalability, protocols are used and developed for networks for a suitable performance in the cloud computing networks. In this paper, a natural-inspired protocol is used in cloud networks to find a good routing, this protocol is called Chaotic Black Widow Optimization Algorithm (CBWOA). Some natural characteristics of the routing strategy are inspired by the black widow optimization algorithm. Taguchi's methods were used for tuning parameters of CBWOA based on orthogonal array experiments. CBWOA is applied with three constraints to measure two factors called energy consumption and throughput by finding best path direction in cloud Computing networks. CBWOA is evaluated in an experimental cloud using the current routing protocols against old routing protocols of the performance network. Finally, the best route in cloud networks is founded successfully and the performance of the developed protocol is associated with two factors, the first one is maximizing (the throughput with efficiency 93.4921% and the Packet delivery ratio with efficiency 90.3087%) and the second one is minimizing (the delay with efficiency 62.1788% and the energy consumed with efficiency 51.1406%).
–如今,互联网的速度变得非常快,用户使用数据中心的大量数据,因此用户需要从最近的地方访问大量数据,以避免任何延迟。数据的存储不会受到用户的任何干扰。由于上述原因,云计算(CC)在寻找数据通过通用网络无延迟、能耗最小地到达用户的最佳路径方面发挥着重要作用。为了实现可扩展性,在云计算网络中使用和开发用于网络的协议以获得合适的性能。本文将一种受自然启发的协议用于云网络中,以找到一个良好的路由,该协议称为混沌黑寡妇优化算法(CBWOA)。路由策略的一些自然特性受到黑寡妇优化算法的启发。基于正交阵列实验,采用田口方法对CBWOA的参数进行了调整。CBWOA具有三个约束条件,通过在云计算网络中寻找最佳路径方向来测量两个因素,即能耗和吞吐量。CBWOA在实验云中使用当前路由协议与性能网络的旧路由协议进行评估。最后,成功地建立了云网络中的最佳路由,所开发的协议的性能与两个因素有关,第一个因素是最大化(效率为93.4921%的吞吐量和效率为90.3087%的分组传送率),第二个因素是最小化(效率为62.1788%的延迟和51.1406%的能耗)。
{"title":"Improved Performance of Cloud Networks Using Chaotic Black Widow Optimization Algorithm","authors":"A. Mokhtar, H. Zaher, Naglaa Ragaa, Eman Mostafa","doi":"10.22247/ijcna/2022/215923","DOIUrl":"https://doi.org/10.22247/ijcna/2022/215923","url":null,"abstract":"– Nowadays, the speed of the internet becomes very high and users use a lot of data from a data center, so users need to access a lot of data from the nearest place to avoid any delay. The data will be stored without any interference from users. Due to the previous reasons, Cloud Computing (CC) plays an important role in finding the best route for data to reach users by general networks without a delay and with the least energy consumption. To achieve scalability, protocols are used and developed for networks for a suitable performance in the cloud computing networks. In this paper, a natural-inspired protocol is used in cloud networks to find a good routing, this protocol is called Chaotic Black Widow Optimization Algorithm (CBWOA). Some natural characteristics of the routing strategy are inspired by the black widow optimization algorithm. Taguchi's methods were used for tuning parameters of CBWOA based on orthogonal array experiments. CBWOA is applied with three constraints to measure two factors called energy consumption and throughput by finding best path direction in cloud Computing networks. CBWOA is evaluated in an experimental cloud using the current routing protocols against old routing protocols of the performance network. Finally, the best route in cloud networks is founded successfully and the performance of the developed protocol is associated with two factors, the first one is maximizing (the throughput with efficiency 93.4921% and the Packet delivery ratio with efficiency 90.3087%) and the second one is minimizing (the delay with efficiency 62.1788% and the energy consumed with efficiency 51.1406%).","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49127578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G Network: techniques to Increase Quality of Service and Quality of Experience 5G网络:提高服务质量和体验质量的技术
Q4 Computer Science Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214508
N. Khan
– The rapid growth of interconnected networks and devices inevitably causes the rise of traffic demand and thus pushes the technologies like long-term evolution-Advanced (LTE-A) and mobile multihop relay WiMAX networks technology to move into the fifth-generation (5G). The 5G network was envisioned to be built to encounter the fundamental challenges of quality of services in existing networks, such as allowing higher data rates, enhanced end-user quality of experience, reduced end-to-end latency, lower energy consumption, and higher traffic capacity. In order to satisfy and achieve the vision of the 5G network, extensive debates are in progress about the numerous techniques to be adapted. The objective of this study is to analyze various techniques for 5G networks to achieve the high enhance Quality of Service (QoS) and Quality of Experience (QoE) for users. Moreover, this paper also discussed several combinations of techniques for the upcoming 5G network, such as mmWave with Massive MIMO, D2D with SDN, D2D with mmWave, and D2D with Machine-to-machine communication and NFV and SDN hybrid. This study will be a significant endeavor in choosing possible techniques for 5G networks and further investigating various combinations of such techniques for future works. To make suitable techniques for the emerging 5G network, guidelines and challenges are highlighted to modify the existing techniques.
–互联网络和设备的快速增长不可避免地会导致流量需求的上升,从而推动长期演进高级(LTE-A)和移动多跳中继WiMAX网络技术等技术进入第五代(5G)。5G网络的建设旨在应对现有网络中服务质量的根本挑战,例如允许更高的数据速率、增强最终用户体验质量、减少端到端延迟、降低能耗和更高的流量。为了满足和实现5G网络的愿景,关于要适应的众多技术的广泛争论正在进行中。本研究的目的是分析5G网络的各种技术,以实现用户的高增强服务质量(QoS)和体验质量(QoE)。此外,本文还讨论了即将到来的5G网络的几种技术组合,如毫米波与大规模MIMO、D2D与SDN、D2D和毫米波,以及D2D与机器对机器通信以及NFV和SDN混合。这项研究将是为5G网络选择可能的技术,并为未来的工作进一步研究这些技术的各种组合的重要努力。为了为新兴的5G网络制定合适的技术,强调了修改现有技术的指导方针和挑战。
{"title":"5G Network: techniques to Increase Quality of Service and Quality of Experience","authors":"N. Khan","doi":"10.22247/ijcna/2022/214508","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214508","url":null,"abstract":"– The rapid growth of interconnected networks and devices inevitably causes the rise of traffic demand and thus pushes the technologies like long-term evolution-Advanced (LTE-A) and mobile multihop relay WiMAX networks technology to move into the fifth-generation (5G). The 5G network was envisioned to be built to encounter the fundamental challenges of quality of services in existing networks, such as allowing higher data rates, enhanced end-user quality of experience, reduced end-to-end latency, lower energy consumption, and higher traffic capacity. In order to satisfy and achieve the vision of the 5G network, extensive debates are in progress about the numerous techniques to be adapted. The objective of this study is to analyze various techniques for 5G networks to achieve the high enhance Quality of Service (QoS) and Quality of Experience (QoE) for users. Moreover, this paper also discussed several combinations of techniques for the upcoming 5G network, such as mmWave with Massive MIMO, D2D with SDN, D2D with mmWave, and D2D with Machine-to-machine communication and NFV and SDN hybrid. This study will be a significant endeavor in choosing possible techniques for 5G networks and further investigating various combinations of such techniques for future works. To make suitable techniques for the emerging 5G network, guidelines and challenges are highlighted to modify the existing techniques.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47552561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-Objective Fault Tolerance Model for Scientific Workflow Scheduling on Cloud Computing 云计算下科学工作流调度的多目标容错模型
Q4 Computer Science Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214505
S. Anuradha, P. Kanmani
– Cloud computing is used for large-scale applications. Therefore, a lot of organizations and industries are moving their data to the cloud. Nevertheless, cloud computing might have maximum failure rates because of the great number of servers and parts with a high workload. Reducing the false in scheduling is a challenging task. Hence, in this study, an efficient multi-objective fault detector strategy using an improved Squirrel Optimization Algorithm (ISOA) in cloud computing is proposed. This method can effectively reduce energy consumption, makespan, and total cost, while also tolerating errors when planning scientific workflows. To increase the detection accuracy of failures, the Active Fault Tolerance Mechanism (PFTM) is used. Similarly, the reactive fault tolerance mechanism (RFTM) is used for processor failures. The efficiency of the proposed approach is analysed based on various measurements and performance compared to other approaches.
—云计算主要用于大规模应用。因此,许多组织和行业正在将他们的数据迁移到云中。然而,云计算可能有最大的故障率,因为大量的服务器和具有高工作负载的部件。减少调度中的错误是一项具有挑战性的任务。为此,本文提出了一种基于改进的云计算松鼠优化算法(ISOA)的高效多目标故障检测策略。这种方法可以有效地降低能耗、完工时间和总成本,同时在规划科学工作流程时也可以容忍错误。为了提高故障的检测精度,采用了主动容错机制(PFTM)。类似地,反应性容错机制(RFTM)用于处理器故障。基于各种测量和性能,与其他方法进行了比较,分析了该方法的效率。
{"title":"Multi-Objective Fault Tolerance Model for Scientific Workflow Scheduling on Cloud Computing","authors":"S. Anuradha, P. Kanmani","doi":"10.22247/ijcna/2022/214505","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214505","url":null,"abstract":"– Cloud computing is used for large-scale applications. Therefore, a lot of organizations and industries are moving their data to the cloud. Nevertheless, cloud computing might have maximum failure rates because of the great number of servers and parts with a high workload. Reducing the false in scheduling is a challenging task. Hence, in this study, an efficient multi-objective fault detector strategy using an improved Squirrel Optimization Algorithm (ISOA) in cloud computing is proposed. This method can effectively reduce energy consumption, makespan, and total cost, while also tolerating errors when planning scientific workflows. To increase the detection accuracy of failures, the Active Fault Tolerance Mechanism (PFTM) is used. Similarly, the reactive fault tolerance mechanism (RFTM) is used for processor failures. The efficiency of the proposed approach is analysed based on various measurements and performance compared to other approaches.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45009594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design a hybrid Optimization and Homomorphic Encryption for Securing Data in a Cloud Environment 云环境下数据安全的混合优化和同态加密设计
Q4 Computer Science Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214502
Mercy Joseph, Gobi Mohan
– Cloud Computing (CC) is denoted as web-based computing that offers devices or users a shared pool of information, resources, or software. It permits small companies and end-users for making the use of different computational resources such as software, storage, and processing ability offered via other companies. But the main problem in CC is data security because of malware and attacks. So this paper developed a novel Hybrid Bat and Cuckoo-based Pallier Homomorphic Encryption (HBC-PHE) scheme for enhancing the data security of the cloud from malware and attacks. Initially, collected datasets are stored in the cloud using the python tool, and collected datasets are transferred into the developed HBC-PHE framework. At first, generate the key for each dataset and separate the private key for all datasets. Moreover, convert the plain text into ciphertext using the bat and cuckoo fitness function in PHE. Finally, cloud-stored data are encrypted successfully and the attained performance outcomes of the developed framework are associated with other existing techniques in terms of confidential rate, decryption time, encryption time, efficiency, and throughput. Additionally, the developed model gained a throughput of 654Kbps, decryption time of 0.05ms, encryption time of 0.08ms, and efficiency of 98.34% for 500kb. As well, the designed model gained a confidential rate of 98.7% and a computation time of 0.03s for using a 500 kb.
–云计算(CC)是指基于网络的计算,为设备或用户提供共享的信息、资源或软件池。它允许小公司和最终用户使用不同的计算资源,如软件、存储和其他公司提供的处理能力。但由于恶意软件和攻击,CC中的主要问题是数据安全。因此,本文开发了一种新的基于蝙蝠和布谷鸟混合的Pallier同态加密(HBC-PHE)方案,以增强云的数据安全性,使其免受恶意软件和攻击。最初,收集到的数据集使用python工具存储在云中,收集的数据集被转移到开发的HBC-PHE框架中。首先,为每个数据集生成密钥,并为所有数据集分离私钥。此外,使用PHE中的bat和杜鹃适应度函数将明文转换为密文。最后,云存储的数据被成功加密,并且所开发的框架在保密率、解密时间、加密时间、效率和吞吐量方面与其他现有技术相关联。此外,该模型的吞吐量为654Kbps,解密时间为0.05ms,加密时间为0.08ms,500kb的效率为98.34%。此外,所设计的模型在使用500kb时获得了98.7%的机密率和0.03s的计算时间。
{"title":"Design a hybrid Optimization and Homomorphic Encryption for Securing Data in a Cloud Environment","authors":"Mercy Joseph, Gobi Mohan","doi":"10.22247/ijcna/2022/214502","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214502","url":null,"abstract":"– Cloud Computing (CC) is denoted as web-based computing that offers devices or users a shared pool of information, resources, or software. It permits small companies and end-users for making the use of different computational resources such as software, storage, and processing ability offered via other companies. But the main problem in CC is data security because of malware and attacks. So this paper developed a novel Hybrid Bat and Cuckoo-based Pallier Homomorphic Encryption (HBC-PHE) scheme for enhancing the data security of the cloud from malware and attacks. Initially, collected datasets are stored in the cloud using the python tool, and collected datasets are transferred into the developed HBC-PHE framework. At first, generate the key for each dataset and separate the private key for all datasets. Moreover, convert the plain text into ciphertext using the bat and cuckoo fitness function in PHE. Finally, cloud-stored data are encrypted successfully and the attained performance outcomes of the developed framework are associated with other existing techniques in terms of confidential rate, decryption time, encryption time, efficiency, and throughput. Additionally, the developed model gained a throughput of 654Kbps, decryption time of 0.05ms, encryption time of 0.08ms, and efficiency of 98.34% for 500kb. As well, the designed model gained a confidential rate of 98.7% and a computation time of 0.03s for using a 500 kb.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49537086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks 适用于移动社交云网络的孤立自适应用户配置文件匹配
Q4 Computer Science Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214506
M. Gobi
– Profile matching (PM) is a crucial method in cloud-based applications including Health Care and Social Networks (HC-SNs). In Mobile Social Cloud Networks (MSCNs), matching user profiles while maintaining privacy is a demanding challenge that has garnered greater attention in recent days. This article represents a new scheme called Modified Cipher Text based Policy Encryption Scheme (MCT-PES), proposed for Solitude Adaptable User Profile Matching for MSCNs (SA-UPM) using Homomorphic Encryption (Ho-En) technique for multiple recipients. In this module, a client submits a Priority-Profile (PP) and searches decentralized MSCNs for people with MP. In this method, neither the participant's profile nor the PP given by the participant is revealed. Furthermore, a Secure Transmission Medium (STM) may be formed between the pair of correctly matched users (MUs). Initially, it ensures verifiability, ensuring that no participant may deceive the initiator by providing an incorrect matching result. Then, the matched profile pair may be used it to create a STM that can withstand an eavesdropping attempt. Furthermore, the mismatched user may be promptly ruled out. Additionally, just a limited exchange between the originator and MUs are required since the MUs can determine the similar outcome without the assistance of the originator, which is beneficial for lowering computational problems and costs.
–配置文件匹配(PM)是基于云的应用程序中的一种关键方法,包括医疗保健和社交网络(HC SN)。在移动社交云网络(MSCN)中,在维护隐私的同时匹配用户档案是一项艰巨的挑战,最近几天引起了更多关注。本文提出了一种新的方案,称为基于改进密码文本的策略加密方案(MCT-PES),用于MSCN的孤立自适应用户配置文件匹配(SA-UPM),该方案使用同态加密(Ho-En)技术用于多个接收方。在该模块中,客户端提交优先级配置文件(PP),并在分散的MSCN中搜索患有MP的人。在该方法中,既不显示参与者的配置文件,也不显示参与者提供的PP。此外,可以在一对正确匹配的用户(MU)之间形成安全传输介质(STM)。最初,它确保了可验证性,确保没有参与者通过提供不正确的匹配结果来欺骗发起人。然后,匹配的配置文件对可以用于创建能够承受窃听尝试的STM。此外,可以立即排除不匹配的用户。此外,只需要发起者和MU之间的有限交换,因为MU可以在没有发起者帮助的情况下确定类似的结果,这有利于降低计算问题和成本。
{"title":"Solitude Adaptable User Profile Matching for Mobile Social Cloud Networks","authors":"M. Gobi","doi":"10.22247/ijcna/2022/214506","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214506","url":null,"abstract":"– Profile matching (PM) is a crucial method in cloud-based applications including Health Care and Social Networks (HC-SNs). In Mobile Social Cloud Networks (MSCNs), matching user profiles while maintaining privacy is a demanding challenge that has garnered greater attention in recent days. This article represents a new scheme called Modified Cipher Text based Policy Encryption Scheme (MCT-PES), proposed for Solitude Adaptable User Profile Matching for MSCNs (SA-UPM) using Homomorphic Encryption (Ho-En) technique for multiple recipients. In this module, a client submits a Priority-Profile (PP) and searches decentralized MSCNs for people with MP. In this method, neither the participant's profile nor the PP given by the participant is revealed. Furthermore, a Secure Transmission Medium (STM) may be formed between the pair of correctly matched users (MUs). Initially, it ensures verifiability, ensuring that no participant may deceive the initiator by providing an incorrect matching result. Then, the matched profile pair may be used it to create a STM that can withstand an eavesdropping attempt. Furthermore, the mismatched user may be promptly ruled out. Additionally, just a limited exchange between the originator and MUs are required since the MUs can determine the similar outcome without the assistance of the originator, which is beneficial for lowering computational problems and costs.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41390809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Model for Smart Home Network Security 基于区块链的智能家庭网络安全模型
Q4 Computer Science Pub Date : 2022-08-30 DOI: 10.22247/ijcna/2022/214509
Abdualrahman Johari, R. Alsaqour
– Network security is a vast topic that combines processes, devices, and technologies. Network security is the group of rules and configurations. This designed to protect the information and networks' integrity, accessibility, and confidentiality using software and hardware. The network nowadays has become complex, which is changing the threat environment. Similarly, smart homes are also becoming prone to security threats. Due to that, ensuring network security is very important. The vulnerabilities of the smart home network can exist in many areas, including users, location, data, and applications. Some smart devices in smart homes may lack system hardening and can have hardcoded passwords, or the passwords can be found without any encryption inside the device or the software. Security of the smart home network is a high priority of the connected devices so that hackers do not get access to sensitive and personal data. Otherwise, this may risk the entire network of the smart home. This research will provide a model to analyze various security concerns of the smart home network. For this research, a qualitative method such as a case study analysis will be done for conducting this research study. In addition, relevant information through the secondary data collection method will be collected. Investigation of various security threats related to smart home networks will be performed, and Blockchain Technology will be used technologies to mitigate the security issues and secure and protect the smart home network secured and protected. In this research, the novel, decentralized, and innovative approach to blockchain technology will be presented, which will be used to enhance the security architecture of the smart home network.
网络安全是一个集流程、设备和技术于一体的宏大课题。网络安全是一组规则和配置。这是为了利用软件和硬件来保护信息和网络的完整性、可访问性和机密性。当今网络日趋复杂,威胁环境正在发生变化。同样,智能家居也容易受到安全威胁。因此,确保网络安全是非常重要的。智能家居网络的漏洞可能存在于许多领域,包括用户、位置、数据和应用。智能家居中的一些智能设备可能缺乏系统加固,并且可能具有硬编码密码,或者可以在设备或软件内部没有任何加密的情况下找到密码。智能家居网络的安全性是连接设备的重中之重,这样黑客就无法访问敏感和个人数据。否则,这可能会危及整个智能家居的网络。本研究将提供一个模型来分析智能家居网络的各种安全问题。对于这项研究,定性的方法,如一个案例研究分析将做进行这项研究。此外,将通过二次数据收集方法收集相关信息。将对与智能家居网络相关的各种安全威胁进行调查,并使用区块链技术来缓解安全问题,并保护智能家居网络的安全。在本研究中,将提出一种新颖的、分散的、创新的区块链技术方法,用于增强智能家庭网络的安全架构。
{"title":"Blockchain-Based Model for Smart Home Network Security","authors":"Abdualrahman Johari, R. Alsaqour","doi":"10.22247/ijcna/2022/214509","DOIUrl":"https://doi.org/10.22247/ijcna/2022/214509","url":null,"abstract":"– Network security is a vast topic that combines processes, devices, and technologies. Network security is the group of rules and configurations. This designed to protect the information and networks' integrity, accessibility, and confidentiality using software and hardware. The network nowadays has become complex, which is changing the threat environment. Similarly, smart homes are also becoming prone to security threats. Due to that, ensuring network security is very important. The vulnerabilities of the smart home network can exist in many areas, including users, location, data, and applications. Some smart devices in smart homes may lack system hardening and can have hardcoded passwords, or the passwords can be found without any encryption inside the device or the software. Security of the smart home network is a high priority of the connected devices so that hackers do not get access to sensitive and personal data. Otherwise, this may risk the entire network of the smart home. This research will provide a model to analyze various security concerns of the smart home network. For this research, a qualitative method such as a case study analysis will be done for conducting this research study. In addition, relevant information through the secondary data collection method will be collected. Investigation of various security threats related to smart home networks will be performed, and Blockchain Technology will be used technologies to mitigate the security issues and secure and protect the smart home network secured and protected. In this research, the novel, decentralized, and innovative approach to blockchain technology will be presented, which will be used to enhance the security architecture of the smart home network.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48080551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Computer Networks and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1