首页 > 最新文献

International Journal of Computer Networks and Applications最新文献

英文 中文
An Interoperability Framework for Enhanced Security of Handheld Devices Using IoT-Based Secure Energy Efficient Firefly Optimization Algorithm 基于物联网的安全节能萤火虫优化算法增强手持设备安全性的互操作性框架
Q4 Computer Science Pub Date : 2023-10-01 DOI: 10.22247/ijcna/2023/223422
G.S. Sapna, Shashikumar Dandinashivara Revanna
– Security is a major challenge in the Internet of Things (IoT) domain as it plays a crucial role in a safe and uninterrupted data transmission, across various hand-held devices connected to the network. Establishing a secure Routing Protocol for Low power and lossy networks (RPL) is necessary and crucial, as it is the standard RPL network in IoT that helps to remove malicious nodes from the network. The existing researches focused on developing energy-saving techniques, malicious node detection techniques, as well as security-enhancing techniques, but neglected energy efficiency, and other trust-related considerations. This resulted in reduced confidentiality and unauthorized access to user data. To overcome these limitations, a Secure Energy Efficient Firefly Optimization Algorithm in RPL (SEEFOA-RPL) is proposed in this research for establishing a reliable and energy-efficient routing path by using Destination-Oriented Directed Acyclic Graph (DODAG) architecture. The proposed algorithm improves security measures in handheld devices such as smartphones, wearable watches, digital cameras, portable media players, and tablets. Initially, a trust model for the RPL network is established to calculate the trust parameters that help in building a secure routing in the network. The SEEFOA is capable of solving complex optimization problems, and finds the best optimum solution for a secure-energy efficient routing path. The proposed SEEFOA-RPL delivers a high-level performance in terms of Detection Rate (DR), False Negative Rate (FNR), and False Positive Rate (FPR), respectively measured at 99%, 12%, and 17% in an attack interval 4, and Packet Drop Ratio (PDR) measured at 82% in an attack interval of 1.5.
{"title":"An Interoperability Framework for Enhanced Security of Handheld Devices Using IoT-Based Secure Energy Efficient Firefly Optimization Algorithm","authors":"G.S. Sapna, Shashikumar Dandinashivara Revanna","doi":"10.22247/ijcna/2023/223422","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223422","url":null,"abstract":"– Security is a major challenge in the Internet of Things (IoT) domain as it plays a crucial role in a safe and uninterrupted data transmission, across various hand-held devices connected to the network. Establishing a secure Routing Protocol for Low power and lossy networks (RPL) is necessary and crucial, as it is the standard RPL network in IoT that helps to remove malicious nodes from the network. The existing researches focused on developing energy-saving techniques, malicious node detection techniques, as well as security-enhancing techniques, but neglected energy efficiency, and other trust-related considerations. This resulted in reduced confidentiality and unauthorized access to user data. To overcome these limitations, a Secure Energy Efficient Firefly Optimization Algorithm in RPL (SEEFOA-RPL) is proposed in this research for establishing a reliable and energy-efficient routing path by using Destination-Oriented Directed Acyclic Graph (DODAG) architecture. The proposed algorithm improves security measures in handheld devices such as smartphones, wearable watches, digital cameras, portable media players, and tablets. Initially, a trust model for the RPL network is established to calculate the trust parameters that help in building a secure routing in the network. The SEEFOA is capable of solving complex optimization problems, and finds the best optimum solution for a secure-energy efficient routing path. The proposed SEEFOA-RPL delivers a high-level performance in terms of Detection Rate (DR), False Negative Rate (FNR), and False Positive Rate (FPR), respectively measured at 99%, 12%, and 17% in an attack interval 4, and Packet Drop Ratio (PDR) measured at 82% in an attack interval of 1.5.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of an Efficient QoS-Aware Adaptive Data Dissemination Engine with DTFC for Mobile Edge Computing Deployments 基于DTFC的移动边缘计算高效qos感知自适应数据传播引擎设计
Q4 Computer Science Pub Date : 2023-10-01 DOI: 10.22247/ijcna/2023/223420
Gagandeep Kaur, Balraj Singh, Ranbir Singh Batth
– In the transformative landscape of mobile edge computing (MEC), where the convergence of computation and communication fuels the era of ubiquitous connectivity, formidable challenges loom large. The burgeoning demand for real-time, data-intensive applications places unprecedented pressure on existing infrastructure, demanding innovative solutions to address the intricate web of challenges. This paper embarks on a compelling journey through the realm of MEC, uncovering the multifaceted challenges that have hitherto impeded its seamless integration into our digital lives. As the proliferation of mobile devices and their insatiable appetite for data strain the network's capacity, latency becomes a formidable adversary, threatening the integrity of applications requiring split-second responsiveness. Furthermore, the capricious nature of mobile devices and their mobility introduces an unpredictable dynamism into the network topology, rendering traditional traffic control approaches ineffective. The consequence is a tangled web of congestion, resource underutilization, and compromised Quality of Service (QoS), all of which hinder the realization of MEC's full potential. In response to these challenges, we unveil a pioneering solution—a QoS-aware Adaptive Data Dissemination Engine (QADE) paired with Dynamic Traffic Flow Control (DTFC). This synergistic model augments the capabilities of MEC deployments by harnessing the power of content-based routing and advanced optimization techniques. QADE, with its innovative utilization of Elephant Herding Particle Swarm Optimizer (EHPSO), refines data dissemination processes with an unprecedented focus on QoS metrics. Temporal delay, energy consumption, throughput, and Packet Delivery Ratio (PDR) become our guiding stars in the quest for routing efficiency. By harnessing this wealth of information, QADE emerges as a beacon of efficiency, driving latency to its lowest ebb, magnifying bandwidth, mitigating packet loss, elevating throughput, and rationalizing operational costs. DTFC complements this endeavor by dynamically steering traffic flows by edge processing capacity, thereby circumventing congestion pitfalls and achieving resource utilization efficiency hitherto considered unattainable. In a series of exhaustive evaluations, our proposed QADE with DTFC emerges as a beacon of hope, surpassing traditional methodologies. With an 8.5% reduction in latency compared to RL, a 16.4% reduction compared to MTO SA, and an impressive 18.0% reduction compared to HFL, it ushers in a new era of real-time data dissemination. By championing QoS awareness, adaptability, and efficiency, this study catapults mobile edge computing into a future defined by resource optimization and stellar network performance, ushering in an era where challenges bow before innovation processes.
{"title":"Design of an Efficient QoS-Aware Adaptive Data Dissemination Engine with DTFC for Mobile Edge Computing Deployments","authors":"Gagandeep Kaur, Balraj Singh, Ranbir Singh Batth","doi":"10.22247/ijcna/2023/223420","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223420","url":null,"abstract":"– In the transformative landscape of mobile edge computing (MEC), where the convergence of computation and communication fuels the era of ubiquitous connectivity, formidable challenges loom large. The burgeoning demand for real-time, data-intensive applications places unprecedented pressure on existing infrastructure, demanding innovative solutions to address the intricate web of challenges. This paper embarks on a compelling journey through the realm of MEC, uncovering the multifaceted challenges that have hitherto impeded its seamless integration into our digital lives. As the proliferation of mobile devices and their insatiable appetite for data strain the network's capacity, latency becomes a formidable adversary, threatening the integrity of applications requiring split-second responsiveness. Furthermore, the capricious nature of mobile devices and their mobility introduces an unpredictable dynamism into the network topology, rendering traditional traffic control approaches ineffective. The consequence is a tangled web of congestion, resource underutilization, and compromised Quality of Service (QoS), all of which hinder the realization of MEC's full potential. In response to these challenges, we unveil a pioneering solution—a QoS-aware Adaptive Data Dissemination Engine (QADE) paired with Dynamic Traffic Flow Control (DTFC). This synergistic model augments the capabilities of MEC deployments by harnessing the power of content-based routing and advanced optimization techniques. QADE, with its innovative utilization of Elephant Herding Particle Swarm Optimizer (EHPSO), refines data dissemination processes with an unprecedented focus on QoS metrics. Temporal delay, energy consumption, throughput, and Packet Delivery Ratio (PDR) become our guiding stars in the quest for routing efficiency. By harnessing this wealth of information, QADE emerges as a beacon of efficiency, driving latency to its lowest ebb, magnifying bandwidth, mitigating packet loss, elevating throughput, and rationalizing operational costs. DTFC complements this endeavor by dynamically steering traffic flows by edge processing capacity, thereby circumventing congestion pitfalls and achieving resource utilization efficiency hitherto considered unattainable. In a series of exhaustive evaluations, our proposed QADE with DTFC emerges as a beacon of hope, surpassing traditional methodologies. With an 8.5% reduction in latency compared to RL, a 16.4% reduction compared to MTO SA, and an impressive 18.0% reduction compared to HFL, it ushers in a new era of real-time data dissemination. By championing QoS awareness, adaptability, and efficiency, this study catapults mobile edge computing into a future defined by resource optimization and stellar network performance, ushering in an era where challenges bow before innovation processes.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Cluster Formation and Multihop Routing Based on Improved Harmony Search Algorithm for Wireless Sensor Networks 基于改进和谐搜索算法的无线传感器网络高效聚类和多跳路由
Q4 Computer Science Pub Date : 2023-10-01 DOI: 10.22247/ijcna/2023/223419
G. V. Sowmya, R. Aparna
– Energy efficiency plays a crucial role in extending the operational lifespan of Wireless Sensor Networks (WSNs). It stands as the foremost objective for any routing algorithm designed for WSNs. This study centers on enhancing communication efficiency through a multihop approach guided by the Harmony Search Algorithm (HSA). The process incorporates Cluster Head (CH) selection through the utilization of the HSA and by assessing the quality of the communication channel. There are instances where a channel possesses high capacity, yet it transmits minimal data, leading to resource underutilization. Therefore, if the communication channel’s quality is pre-determined, then algorithms can be developed to establish an upper limit for channel usage, ensuring congestion free and error free maximum data transmission. In the proposed methodology, parameters such as residual energy, distance and node degree were taken into account for CH selection. Subsequently, clusters were formed based on Shannon Channel Capacity ‘C’ and path loss model. Following the CH selection and cluster formation, a communication was established using HSA. A comparative analysis was conducted on network life span, packets sent to Base Station (BS) and energy utilization for the three algorithms, Energy Efficient Harmony Search Based Routing (EEHSBR), Clustering and Routing in wireless sensor networks using Harmony Search Algorithm (CRHS), and Robust Harmony Search Algorithm based clustering protocol for wireless sensor networks (RHSA).
{"title":"Energy Efficient Cluster Formation and Multihop Routing Based on Improved Harmony Search Algorithm for Wireless Sensor Networks","authors":"G. V. Sowmya, R. Aparna","doi":"10.22247/ijcna/2023/223419","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223419","url":null,"abstract":"– Energy efficiency plays a crucial role in extending the operational lifespan of Wireless Sensor Networks (WSNs). It stands as the foremost objective for any routing algorithm designed for WSNs. This study centers on enhancing communication efficiency through a multihop approach guided by the Harmony Search Algorithm (HSA). The process incorporates Cluster Head (CH) selection through the utilization of the HSA and by assessing the quality of the communication channel. There are instances where a channel possesses high capacity, yet it transmits minimal data, leading to resource underutilization. Therefore, if the communication channel’s quality is pre-determined, then algorithms can be developed to establish an upper limit for channel usage, ensuring congestion free and error free maximum data transmission. In the proposed methodology, parameters such as residual energy, distance and node degree were taken into account for CH selection. Subsequently, clusters were formed based on Shannon Channel Capacity ‘C’ and path loss model. Following the CH selection and cluster formation, a communication was established using HSA. A comparative analysis was conducted on network life span, packets sent to Base Station (BS) and energy utilization for the three algorithms, Energy Efficient Harmony Search Based Routing (EEHSBR), Clustering and Routing in wireless sensor networks using Harmony Search Algorithm (CRHS), and Robust Harmony Search Algorithm based clustering protocol for wireless sensor networks (RHSA).","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136153661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Cryptographic Cipher Solution for Secure Communication in Smart Cities 一种用于智慧城市安全通信的混合密码解决方案
Q4 Computer Science Pub Date : 2023-10-01 DOI: 10.22247/ijcna/2023/223423
Mohammed Naif Alatawi
– The proliferation of sensor networks and other Internet of Things devices has prompted growing privacy and safety concerns. These devices have very little memory, computing power, and storage space. Security for low-powered IoT devices, such as RFID tags, nodes in wireless sensor networks (WSNs), etc., has become increasingly difficult. So, enough security for these devices was achieved by the development of lightweight cryptographic algorithms. In recent years, "smart cities" have emerged to improve contemporary lifestyles and further social development. These are enabled by developments in ICT and may open up new avenues for social and economic development. However, not everything is as secure and private as we hope it will be. The effects of the Internet of Things on IoT-based data transmission networks have been the subject of extensive study over the past few decades. Due to this flaw in the authentication process, verifying the identification of such people safely is extremely difficult. The study's goal is to provide a safe authentication technique for IoT that makes use of Hybrid and Adaptive Cryptography (HAC). In this study, we focus on authentication as a potential security risk in IoT data transmission networks. The study proposes a hybrid and adaptive cryptography (HAC) approach to authentication for the Internet of Things as a means of resolving this issue. The proposed technique of cryptographic protection makes use of the exclusive-or (Ex-or) operation, a hashing function, and a hybrid encryption strategy based on the Rivest Shamir Adleman (RSA) and the Advanced Encryption Standard (AES) algorithms. The proposed solution is simple to implement while effectively overcoming the cryptographic system's constraints via a hybrid encryption mechanism. Using the Diffie-Hellman key exchange protocol, the RSA algorithm for privacy, and the SHA-1 algorithm for authenticity, this study aims to provide a unified security architecture for modern networks.
{"title":"A Hybrid Cryptographic Cipher Solution for Secure Communication in Smart Cities","authors":"Mohammed Naif Alatawi","doi":"10.22247/ijcna/2023/223423","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223423","url":null,"abstract":"– The proliferation of sensor networks and other Internet of Things devices has prompted growing privacy and safety concerns. These devices have very little memory, computing power, and storage space. Security for low-powered IoT devices, such as RFID tags, nodes in wireless sensor networks (WSNs), etc., has become increasingly difficult. So, enough security for these devices was achieved by the development of lightweight cryptographic algorithms. In recent years, \"smart cities\" have emerged to improve contemporary lifestyles and further social development. These are enabled by developments in ICT and may open up new avenues for social and economic development. However, not everything is as secure and private as we hope it will be. The effects of the Internet of Things on IoT-based data transmission networks have been the subject of extensive study over the past few decades. Due to this flaw in the authentication process, verifying the identification of such people safely is extremely difficult. The study's goal is to provide a safe authentication technique for IoT that makes use of Hybrid and Adaptive Cryptography (HAC). In this study, we focus on authentication as a potential security risk in IoT data transmission networks. The study proposes a hybrid and adaptive cryptography (HAC) approach to authentication for the Internet of Things as a means of resolving this issue. The proposed technique of cryptographic protection makes use of the exclusive-or (Ex-or) operation, a hashing function, and a hybrid encryption strategy based on the Rivest Shamir Adleman (RSA) and the Advanced Encryption Standard (AES) algorithms. The proposed solution is simple to implement while effectively overcoming the cryptographic system's constraints via a hybrid encryption mechanism. Using the Diffie-Hellman key exchange protocol, the RSA algorithm for privacy, and the SHA-1 algorithm for authenticity, this study aims to provide a unified security architecture for modern networks.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136152369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Restricted Flooding Based Route Discovery (RFBRD) Scheme for AODV Routing 一种高效的基于限制泛洪的AODV路由发现(RFBRD)方案
Q4 Computer Science Pub Date : 2023-10-01 DOI: 10.22247/ijcna/2023/223424
Poonam T. Agarkar, Manish D. Chawhan, Rahul N. Nawkhare, Daljeet Singh, Narendra P. Giradkar, Prashant R. Patil
– AODV is one of the widely used routing schemes in WSN and MANET due to its on-demand characteristics and low overhead. The excessive flooding at the time of route discovery consumes lots of node energy. The network performance deteriorates due to the unconstrained and blind flooding of route request (RREQ) packets. The excessive flooding mechanism accounts for multiple reception of RREQ packets at nodes. It causes unwanted path loops, and packet collisions thus exhausting the node batteries. The restricted flooding-based route discovery (RFBRD) mechanism introduced in this paper adopts two different strategies for receiving first and subsequent RREQ packets before they are forwarded. On reception of the first RREQ at an intermediate node, the RREQ is forwarded/restricted based on node densities evaluated for the neighbourhood as well as the network. Four regions and five probabilities are considered based on node densities in the neighbourhood and the network. The mobile nodes lying in the low-density region are allowed to transmit the RREQ packets with higher probability as compared to other nodes present in high-density regions when the RREQ is received for the first time. For subsequent RREQ packets at an intermediate node, the RREQ is forwarded/restricted based on energy ratios and is allowed to forward the RREQ packets, if the node has sufficient residual energy concerning neighbourhood and network energies. Simulation analysis showed enhanced and improved performance in terms of end-to-end delay, and network residual energy concerning traditional AODV.
{"title":"An Efficient Restricted Flooding Based Route Discovery (RFBRD) Scheme for AODV Routing","authors":"Poonam T. Agarkar, Manish D. Chawhan, Rahul N. Nawkhare, Daljeet Singh, Narendra P. Giradkar, Prashant R. Patil","doi":"10.22247/ijcna/2023/223424","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223424","url":null,"abstract":"– AODV is one of the widely used routing schemes in WSN and MANET due to its on-demand characteristics and low overhead. The excessive flooding at the time of route discovery consumes lots of node energy. The network performance deteriorates due to the unconstrained and blind flooding of route request (RREQ) packets. The excessive flooding mechanism accounts for multiple reception of RREQ packets at nodes. It causes unwanted path loops, and packet collisions thus exhausting the node batteries. The restricted flooding-based route discovery (RFBRD) mechanism introduced in this paper adopts two different strategies for receiving first and subsequent RREQ packets before they are forwarded. On reception of the first RREQ at an intermediate node, the RREQ is forwarded/restricted based on node densities evaluated for the neighbourhood as well as the network. Four regions and five probabilities are considered based on node densities in the neighbourhood and the network. The mobile nodes lying in the low-density region are allowed to transmit the RREQ packets with higher probability as compared to other nodes present in high-density regions when the RREQ is received for the first time. For subsequent RREQ packets at an intermediate node, the RREQ is forwarded/restricted based on energy ratios and is allowed to forward the RREQ packets, if the node has sufficient residual energy concerning neighbourhood and network energies. Simulation analysis showed enhanced and improved performance in terms of end-to-end delay, and network residual energy concerning traditional AODV.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decisiveness PSO-Based Gaussian AOMDV (DPSO-GAOMDV) Routing Protocol: Smart Routing for Dynamic Traffic Conditions in Stochastic Vehicular Ad Hoc Network 基于决策pso的高斯AOMDV (DPSO-GAOMDV)路由协议:随机车辆自组网中动态交通条件下的智能路由
Q4 Computer Science Pub Date : 2023-10-01 DOI: 10.22247/ijcna/2023/223430
M. Kayalvizhi, S. Geetha
– Vehicular Ad Hoc Networks (VANETs) have gained prominence in vehicular communication due to their potential to enhance road safety, traffic efficiency, and infotainment services. However, the evolution of Stochastic VANETs (SVANETs) has introduced a layer of uncertainty, where vehicular interactions are influenced by dynamic factors such as varying traffic conditions, changing communication environments, and unpredictable link qualities. Routing within SVANETs presents distinct challenges stemming from the stochastic nature of the environment. Traditional routing protocols struggle to maintain reliable connections amidst fluctuating link conditions, leading to increased latency, dropped packets, and inefficient route utilization. The novel “Decisiveness PSO-Based Gaussian AOMDV (DPSO-GAOMDV) Routing Protocol” is introduced to address these challenges. This innovative protocol combines the predictive power of Gaussian-Anticipatory On-Demand Distance Vector (GAOMDV) routing with the dynamic adaptability of Particle Swarm Optimization (PSO). GAOMDV’s ability to anticipate link stability using Gaussian distribution is integrated with DPSO’s agility in optimizing routing decisions. The simulation phase of the study evaluates the DPSO-GAOMDV protocol under various stochastic vehicular scenarios. The protocol’s performance is thoroughly analyzed by emulating real-world traffic conditions and communication dynamics. The simulation results underscore the protocol’s efficacy in reducing route maintenance overhead, improved packet delivery ratios, and enhanced network stability. The predictive insights and dynamic optimization mechanisms showcase its potential to drive innovative, resilient and efficient routing strategies in the face of stochastic vehicular conditions.
{"title":"Decisiveness PSO-Based Gaussian AOMDV (DPSO-GAOMDV) Routing Protocol: Smart Routing for Dynamic Traffic Conditions in Stochastic Vehicular Ad Hoc Network","authors":"M. Kayalvizhi, S. Geetha","doi":"10.22247/ijcna/2023/223430","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223430","url":null,"abstract":"– Vehicular Ad Hoc Networks (VANETs) have gained prominence in vehicular communication due to their potential to enhance road safety, traffic efficiency, and infotainment services. However, the evolution of Stochastic VANETs (SVANETs) has introduced a layer of uncertainty, where vehicular interactions are influenced by dynamic factors such as varying traffic conditions, changing communication environments, and unpredictable link qualities. Routing within SVANETs presents distinct challenges stemming from the stochastic nature of the environment. Traditional routing protocols struggle to maintain reliable connections amidst fluctuating link conditions, leading to increased latency, dropped packets, and inefficient route utilization. The novel “Decisiveness PSO-Based Gaussian AOMDV (DPSO-GAOMDV) Routing Protocol” is introduced to address these challenges. This innovative protocol combines the predictive power of Gaussian-Anticipatory On-Demand Distance Vector (GAOMDV) routing with the dynamic adaptability of Particle Swarm Optimization (PSO). GAOMDV’s ability to anticipate link stability using Gaussian distribution is integrated with DPSO’s agility in optimizing routing decisions. The simulation phase of the study evaluates the DPSO-GAOMDV protocol under various stochastic vehicular scenarios. The protocol’s performance is thoroughly analyzed by emulating real-world traffic conditions and communication dynamics. The simulation results underscore the protocol’s efficacy in reducing route maintenance overhead, improved packet delivery ratios, and enhanced network stability. The predictive insights and dynamic optimization mechanisms showcase its potential to drive innovative, resilient and efficient routing strategies in the face of stochastic vehicular conditions.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Dynamic Link Prediction Protocol for Frequent Link Disconnections in Vehicular Ad Hoc Networks 一种针对车辆自组织网络中频繁链路断开的动态链路预测协议
Q4 Computer Science Pub Date : 2023-10-01 DOI: 10.22247/ijcna/2023/223429
H. Ateeq Ahmed, Dhanaraj Cheelu
– Vehicular Ad hoc Networks (VANETs) face challenges in maintaining communication links due to their large network sizes and rapidly changing topologies. Frequent link disconnections can impact the performance of vehicular applications, which are crucial for Intelligent Transport Systems (ITS). The objective of the research is to develop a dynamic link prediction protocol (NDLP) that can predict when a link is likely to become unavailable. By predicting link disconnections in advance, the protocol aims to reroute data packets through alternative paths to ensure uninterrupted communication. In this paper, a novel dynamic link prediction protocol (NDLP) is proposed to determine the duration of availability of the current path. This protocol predicts the duration of current path availability, aiming to pre-emptively predict connection breakdowns and reroute data packets via alternate paths. The proposed methodology involves the use of Newton's divided difference interpolation to assess the presence of active links to adjacent nodes. This technique employs historical data or real-time measurements to predict the future state of links. The primary focus is on predicting link disconnections before they occur and pre-emptively rerouting packets using an alternative path. The estimation of the time of link breakage and the ability to select the best route before the link breakage is analysed. Simulation results have proven the effectiveness of NDLP protocol with its counterpart protocols in terms of delay, packet delivery ratio and throughput.
{"title":"A Novel Dynamic Link Prediction Protocol for Frequent Link Disconnections in Vehicular Ad Hoc Networks","authors":"H. Ateeq Ahmed, Dhanaraj Cheelu","doi":"10.22247/ijcna/2023/223429","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223429","url":null,"abstract":"– Vehicular Ad hoc Networks (VANETs) face challenges in maintaining communication links due to their large network sizes and rapidly changing topologies. Frequent link disconnections can impact the performance of vehicular applications, which are crucial for Intelligent Transport Systems (ITS). The objective of the research is to develop a dynamic link prediction protocol (NDLP) that can predict when a link is likely to become unavailable. By predicting link disconnections in advance, the protocol aims to reroute data packets through alternative paths to ensure uninterrupted communication. In this paper, a novel dynamic link prediction protocol (NDLP) is proposed to determine the duration of availability of the current path. This protocol predicts the duration of current path availability, aiming to pre-emptively predict connection breakdowns and reroute data packets via alternate paths. The proposed methodology involves the use of Newton's divided difference interpolation to assess the presence of active links to adjacent nodes. This technique employs historical data or real-time measurements to predict the future state of links. The primary focus is on predicting link disconnections before they occur and pre-emptively rerouting packets using an alternative path. The estimation of the time of link breakage and the ability to select the best route before the link breakage is analysed. Simulation results have proven the effectiveness of NDLP protocol with its counterpart protocols in terms of delay, packet delivery ratio and throughput.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136129471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taxonomy of Various Routing Protocols of IoT-Based on Wireless Sensor Networks for Healthcare: Review 用于医疗保健的基于无线传感器网络的物联网各种路由协议的分类:综述
Q4 Computer Science Pub Date : 2023-08-31 DOI: 10.22247/ijcna/2023/223314
Monika Pahuja, Dinesh Kumar
– In recent decades, the world's largest sector has undergone enormous transformations with the emergence of a new platform, denoted as 'healthcare' and based on the IoT (Internet of Things). Numerous hospital administrators are increasing their investment in converting existing activities to maximize the benefits of IoT, creating the foundation for the wireless healthcare system through a vast network of sensing devices and equipment. The wireless sensor system comprises minimal sensor equipment with limited processing capacity. IoT-based WSN systems are beneficial for smart healthcare. Healthcare has become one of the WSN (wireless sensor network)-based IoT application fields that have attracted much more attention from corporate, government sources, etc in the past few years. In the medical industry, the growth of IoT enhances patient safety, employee engagement, and productivity improvement for the overall system. Healthcare-based IoT wireless sensor systems for patients have several benefits: tracking and alerting, patient information management, remotely assisting the healthcare system, etc. In the context of wireless sensor healthcare systems utilizing Internet of Things (IoT) technology, the infrastructure encompasses a range of essential elements. These include sensing devices responsible for data collection, communication protocols facilitating data transmission, data storage devices for retaining collected information, and subscribers who access and utilize the acquired data. The IoT framework in healthcare systems comprises three fundamental components: the publisher, broker, and subscriber. The publisher is known for sensors and wearable devices. Brokers process the sensing data and then make it available to subscribers. The three components are connected via a wireless connection like Bluetooth, Wi-Fi, etc. The routing protocols are used for wireless connections in healthcare based on IoT systems. There are various categories of routing protocols used in the wireless healthcare network. This paper discusses various routing protocols with types, and comparison tables of routing protocols are depicted. A comprehensive review of healthcare-based IoT applications and an advanced medical care system benefits doctors and patients. The experts monitor ECG (electrocardiography), blood pressure, temperature, etc. The comparison of several methods based on throughput, E2D (end-to-end) delay, consumption, and data packet delay ratio (PDR) is depicted in this paper for a better understanding of the existing systems.
-近几十年来,随着一个基于物联网(IoT)的新平台的出现,世界上最大的行业经历了巨大的变革,该平台被称为“医疗保健”。许多医院管理人员正在增加对现有活动的投资,以最大限度地发挥物联网的好处,通过庞大的传感设备和设备网络为无线医疗保健系统奠定基础。无线传感器系统包括处理能力有限的最小传感器设备。基于物联网的WSN系统有利于智能医疗。近年来,医疗保健已成为基于无线传感器网络(WSN)的物联网应用领域之一,受到企业、政府等部门的广泛关注。在医疗行业,物联网的发展增强了整个系统的患者安全、员工敬业度和生产力。针对患者的基于医疗保健的物联网无线传感器系统有几个好处:跟踪和警报、患者信息管理、远程协助医疗保健系统等。在利用物联网(IoT)技术的无线传感器医疗保健系统中,基础设施包括一系列基本元素。这些包括负责数据收集的传感设备,促进数据传输的通信协议,用于保留收集到的信息的数据存储设备,以及访问和利用所获取数据的订户。医疗保健系统中的物联网框架包括三个基本组件:发布者、代理和订阅者。这家出版商以传感器和可穿戴设备而闻名。代理处理感知数据,然后将其提供给订阅者。这三个组件通过蓝牙、Wi-Fi等无线连接。路由协议用于基于物联网系统的医疗保健中的无线连接。无线医疗保健网络中使用的路由协议有各种类别。讨论了各种路由协议的类型,并给出了路由协议的比较表。全面审查基于医疗保健的物联网应用和先进的医疗保健系统,使医生和患者受益。专家监测心电图、血压、体温等。为了更好地理解现有系统,本文描述了基于吞吐量、E2D(端到端)延迟、消耗和数据包延迟比(PDR)的几种方法的比较。
{"title":"Taxonomy of Various Routing Protocols of IoT-Based on Wireless Sensor Networks for Healthcare: Review","authors":"Monika Pahuja, Dinesh Kumar","doi":"10.22247/ijcna/2023/223314","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223314","url":null,"abstract":"– In recent decades, the world's largest sector has undergone enormous transformations with the emergence of a new platform, denoted as 'healthcare' and based on the IoT (Internet of Things). Numerous hospital administrators are increasing their investment in converting existing activities to maximize the benefits of IoT, creating the foundation for the wireless healthcare system through a vast network of sensing devices and equipment. The wireless sensor system comprises minimal sensor equipment with limited processing capacity. IoT-based WSN systems are beneficial for smart healthcare. Healthcare has become one of the WSN (wireless sensor network)-based IoT application fields that have attracted much more attention from corporate, government sources, etc in the past few years. In the medical industry, the growth of IoT enhances patient safety, employee engagement, and productivity improvement for the overall system. Healthcare-based IoT wireless sensor systems for patients have several benefits: tracking and alerting, patient information management, remotely assisting the healthcare system, etc. In the context of wireless sensor healthcare systems utilizing Internet of Things (IoT) technology, the infrastructure encompasses a range of essential elements. These include sensing devices responsible for data collection, communication protocols facilitating data transmission, data storage devices for retaining collected information, and subscribers who access and utilize the acquired data. The IoT framework in healthcare systems comprises three fundamental components: the publisher, broker, and subscriber. The publisher is known for sensors and wearable devices. Brokers process the sensing data and then make it available to subscribers. The three components are connected via a wireless connection like Bluetooth, Wi-Fi, etc. The routing protocols are used for wireless connections in healthcare based on IoT systems. There are various categories of routing protocols used in the wireless healthcare network. This paper discusses various routing protocols with types, and comparison tables of routing protocols are depicted. A comprehensive review of healthcare-based IoT applications and an advanced medical care system benefits doctors and patients. The experts monitor ECG (electrocardiography), blood pressure, temperature, etc. The comparison of several methods based on throughput, E2D (end-to-end) delay, consumption, and data packet delay ratio (PDR) is depicted in this paper for a better understanding of the existing systems.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48519748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction Model to Analyze Source Node Localization Using Machine Learning and Fault-Tolerant in Wireless Sensor Networks 基于机器学习和容错的无线传感器网络源节点定位预测模型
Q4 Computer Science Pub Date : 2023-08-31 DOI: 10.22247/ijcna/2023/223312
P. Sakthi, Shunmuga Sundaram, K. Vijayan
– Recent technological developments include wireless sensor networks in modern and intelligent environments. Finding the localization of the sensor node is a problem in the research community field. Localization on a two-dimensional plane, a key focus in WSNs, is to maximize the lifespan and overall performance of sensor nodes by minimizing their energy consumption. The compiled data that base stations receive from packets.in wireless sensor networks can be used to make decisions with the help of localization. A cost-effective method of solving the problem is not the Internet of Things with GPR tracking sensor zones. There are several approaches to locating wireless sensor networks with unclear sensor locations. The main challenge lies in accurately determining the location of the base station's sensor node with a minor localization error during wireless communication. The proposed method, Distributed clustering Distance Algorithm (DCDA) using machine learning, considers the distance estimation error, location in accuracy, and fault tolerance issue with WSNs. According to the findings, the average localization error is 11% and 11.3%, respectively. For anchor nodes 20-80 and 200-450. As a result, when compared to contemporary methods of localization with centroid weighted algorithm (LCWA), Distance vector hop algorithm (DV-Hop), Coefficient for reparation algorithm (CRA), and Weighted Distributed Hyperbolic algorithm (WDHA) methods, the demonstrated Distributed clustering Distance Algorithm (DCDA) gives greater accuracy. According to the experimental results, the suggested algorithm significantly improves the number of alive nodes compared to the LBCA and G. Gupta FT algorithms. Specifically, the proposed algorithm achieves a remarkable 96% increase in active and functional nodes within the wireless sensor network.
–最近的技术发展包括现代智能环境中的无线传感器网络。找到传感器节点的定位是研究界领域的一个问题。二维平面上的定位是无线传感器网络的一个关键焦点,它是通过最小化传感器节点的能量消耗来最大限度地延长传感器节点的寿命和整体性能。在定位的帮助下,基站从无线传感器网络中的分组接收的编译数据可以用于做出决策。解决这个问题的一种成本效益高的方法不是使用GPR跟踪传感器区域的物联网。有几种方法可以定位传感器位置不清楚的无线传感器网络。主要挑战在于在无线通信期间以较小的定位误差准确地确定基站的传感器节点的位置。所提出的方法,使用机器学习的分布式聚类距离算法(DCDA),考虑了无线传感器网络的距离估计误差、定位精度和容错问题。根据研究结果,平均定位误差分别为11%和11.3%。对于锚节点20-80和200-450。结果,与质心加权算法(LCWA)、距离向量跳跃算法(DV-hop)、修复系数算法(CRA)和加权分布式双曲算法(WDHA)等现代定位方法相比,所证明的分布式聚类距离算法(DCDA)具有更高的精度。根据实验结果,与LBCA和G.Gupta FT算法相比,所提出的算法显著提高了活动节点的数量。具体而言,所提出的算法在无线传感器网络中的活动节点和功能节点显著增加了96%。
{"title":"Prediction Model to Analyze Source Node Localization Using Machine Learning and Fault-Tolerant in Wireless Sensor Networks","authors":"P. Sakthi, Shunmuga Sundaram, K. Vijayan","doi":"10.22247/ijcna/2023/223312","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223312","url":null,"abstract":"– Recent technological developments include wireless sensor networks in modern and intelligent environments. Finding the localization of the sensor node is a problem in the research community field. Localization on a two-dimensional plane, a key focus in WSNs, is to maximize the lifespan and overall performance of sensor nodes by minimizing their energy consumption. The compiled data that base stations receive from packets.in wireless sensor networks can be used to make decisions with the help of localization. A cost-effective method of solving the problem is not the Internet of Things with GPR tracking sensor zones. There are several approaches to locating wireless sensor networks with unclear sensor locations. The main challenge lies in accurately determining the location of the base station's sensor node with a minor localization error during wireless communication. The proposed method, Distributed clustering Distance Algorithm (DCDA) using machine learning, considers the distance estimation error, location in accuracy, and fault tolerance issue with WSNs. According to the findings, the average localization error is 11% and 11.3%, respectively. For anchor nodes 20-80 and 200-450. As a result, when compared to contemporary methods of localization with centroid weighted algorithm (LCWA), Distance vector hop algorithm (DV-Hop), Coefficient for reparation algorithm (CRA), and Weighted Distributed Hyperbolic algorithm (WDHA) methods, the demonstrated Distributed clustering Distance Algorithm (DCDA) gives greater accuracy. According to the experimental results, the suggested algorithm significantly improves the number of alive nodes compared to the LBCA and G. Gupta FT algorithms. Specifically, the proposed algorithm achieves a remarkable 96% increase in active and functional nodes within the wireless sensor network.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41543233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Automated Intrusion Detection and Prevention Model for Enhanced Network Security and Threat Assessment 一种用于增强网络安全和威胁评估的自动入侵检测和防御模型
Q4 Computer Science Pub Date : 2023-08-31 DOI: 10.22247/ijcna/2023/223316
K. Prabu, P. Sudhakar
– Amid the soaring cyber threats and security breaches, we introduce an automated intrusion detection and prevention model to bolster threat assessment and security data solutions. Our model, utilizing the state-of-the-art Automatic Intrusion Detection System (AIDS) and real-time data analysis, promptly identifies and responds to potential security breaches. It gathers security data from multiple sources, such as network traffic, system logs, user behaviour, and external threat intelligence feeds, enhancing overall cybersecurity defenses. The increasing volume of data sharing and network traffic has raised concerns about cybersecurity. To address this issue, we propose the Automatic Intrusion Detection System (AiDS) is defined as monitoring the network for suspicious activity for managing network traffic. The activities detected are monitored based on the alerts, and the operation centres are analyzed using the appropriate actions to remediate the threat. The Automatic intrusion Detection System and the Intrusion Prevention System (IPS) have been used to prevent and secure network data. By using the technique of Automatic intrusion Detection System (AiDS), the identification of the endpoint protection, which is related to the hunting engine, risk management, incident response mobile security, and access management and by using the technique of Intrusion Prevention System (AiPS) the vulnerability of threat management and the analysis of the data in the network is proposed. The result describes the 97.2% of data in the KDD 99 data set, the accuracy and sensitivity of the data from the network is 92.8%, and the system's formation. The approximate data in the database is 75%. The security services' intrusion and the system's data formation in the digital threat data have been accessed successfully
–在网络威胁和安全漏洞激增的情况下,我们引入了自动入侵检测和预防模型,以支持威胁评估和安全数据解决方案。我们的模型利用最先进的自动入侵检测系统(AIDS)和实时数据分析,能够及时识别和应对潜在的安全漏洞。它从多个来源收集安全数据,如网络流量、系统日志、用户行为和外部威胁情报,增强了整体网络安全防御。数据共享和网络流量的不断增加引发了人们对网络安全的担忧。为了解决这个问题,我们提出将自动入侵检测系统(AiDS)定义为监控网络中的可疑活动,以管理网络流量。根据警报监测检测到的活动,并使用适当的措施对运营中心进行分析,以补救威胁。自动入侵检测系统和入侵防御系统(IPS)已被用于防止和保护网络数据。利用自动入侵检测系统(AiDS)技术,识别了与搜索引擎、风险管理、事件响应移动安全和访问管理相关的端点保护,并利用入侵防御系统(AiPS)技术,提出了威胁管理的漏洞和网络中数据的分析。结果描述了KDD99数据集中97.2%的数据,网络数据的准确性和敏感性为92.8%,以及系统的形成。数据库中的近似数据为75%。安全服务的入侵和系统在数字威胁数据中的数据形成已成功访问
{"title":"An Automated Intrusion Detection and Prevention Model for Enhanced Network Security and Threat Assessment","authors":"K. Prabu, P. Sudhakar","doi":"10.22247/ijcna/2023/223316","DOIUrl":"https://doi.org/10.22247/ijcna/2023/223316","url":null,"abstract":"– Amid the soaring cyber threats and security breaches, we introduce an automated intrusion detection and prevention model to bolster threat assessment and security data solutions. Our model, utilizing the state-of-the-art Automatic Intrusion Detection System (AIDS) and real-time data analysis, promptly identifies and responds to potential security breaches. It gathers security data from multiple sources, such as network traffic, system logs, user behaviour, and external threat intelligence feeds, enhancing overall cybersecurity defenses. The increasing volume of data sharing and network traffic has raised concerns about cybersecurity. To address this issue, we propose the Automatic Intrusion Detection System (AiDS) is defined as monitoring the network for suspicious activity for managing network traffic. The activities detected are monitored based on the alerts, and the operation centres are analyzed using the appropriate actions to remediate the threat. The Automatic intrusion Detection System and the Intrusion Prevention System (IPS) have been used to prevent and secure network data. By using the technique of Automatic intrusion Detection System (AiDS), the identification of the endpoint protection, which is related to the hunting engine, risk management, incident response mobile security, and access management and by using the technique of Intrusion Prevention System (AiPS) the vulnerability of threat management and the analysis of the data in the network is proposed. The result describes the 97.2% of data in the KDD 99 data set, the accuracy and sensitivity of the data from the network is 92.8%, and the system's formation. The approximate data in the database is 75%. The security services' intrusion and the system's data formation in the digital threat data have been accessed successfully","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47271988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Computer Networks and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1