首页 > 最新文献

International Journal of Computer Networks and Applications最新文献

英文 中文
Energy Efficient Multi Hop D2D Communication Using Deep Reinforcement Learning in 5G Networks 5G网络中使用深度强化学习的高能效多跳D2D通信
Q4 Computer Science Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221897
M. Khan, Ashish Adholiya
– One of the most potential 5G technologies for wireless networks is device-to-device (D2D) communication. It promises peer-to-peer consumers high data speeds, ubiquity, and low latency, energy, and spectrum efficiency. These benefits make it possible for D2D communication to be completely realized in a multi-hop communication scenario. However, the energy efficient multi hop routing is more challenging task. Hence, this research deep reinforcement learning based multi hop routing protocol is introduced. In this, the energy consumption is considered by the proposed double deep Q learning technique for identifying the possible paths. Then, the optimal best path is selected by the proposed Gannet Chimp optimization (GCO) algorithm using multi-objective fitness function. The assessment of the proposed method based on various measures like packet delivery ratio, latency, residual energy, throughput and network lifetime accomplished the values of 99.89, 1.63, 0.98, 64 and 99.69 respectively.
无线网络中最有潜力的5G技术之一是设备对设备(D2D)通信。它向点对点消费者承诺了高数据速度、无处不在、低延迟、能源和频谱效率。这些优点使得在多跳通信场景中完全实现D2D通信成为可能。然而,高效节能的多跳路由是一项具有挑战性的任务。因此,本文研究了基于深度强化学习的多跳路由协议。在此,提出的双深度Q学习技术考虑了能量消耗来识别可能的路径。然后,采用多目标适应度函数的GCO算法选择最优路径;基于包投递率、延迟、剩余能量、吞吐量和网络寿命等多种指标对所提出方法的评估分别达到了99.89、1.63、0.98、64和99.69。
{"title":"Energy Efficient Multi Hop D2D Communication Using Deep Reinforcement Learning in 5G Networks","authors":"M. Khan, Ashish Adholiya","doi":"10.22247/ijcna/2023/221897","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221897","url":null,"abstract":"– One of the most potential 5G technologies for wireless networks is device-to-device (D2D) communication. It promises peer-to-peer consumers high data speeds, ubiquity, and low latency, energy, and spectrum efficiency. These benefits make it possible for D2D communication to be completely realized in a multi-hop communication scenario. However, the energy efficient multi hop routing is more challenging task. Hence, this research deep reinforcement learning based multi hop routing protocol is introduced. In this, the energy consumption is considered by the proposed double deep Q learning technique for identifying the possible paths. Then, the optimal best path is selected by the proposed Gannet Chimp optimization (GCO) algorithm using multi-objective fitness function. The assessment of the proposed method based on various measures like packet delivery ratio, latency, residual energy, throughput and network lifetime accomplished the values of 99.89, 1.63, 0.98, 64 and 99.69 respectively.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45726687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficient Trustworthy Target Tracking Scheme (3TS) based on Clustering and Task Cycle Scheduling for Wireless Sensor Networks 基于聚类和任务周期调度的无线传感器网络节能可信目标跟踪方案
Q4 Computer Science Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221904
S. Sebastian, G. Jagatheeshkumar
– One of the notable uses of Wireless Sensor Networks (WSN) is target detection and tracking. The primary objectives of a target tracking system are to improve target tracking precision and network longevity. This paper presents a Trustworthy Target Tracking Scheme (3TS) for WSN. The entire network region is divided into several grids of equal size, with each grid functioning as a cluster. All the grids include the same number of nodes. A Cluster Head (CH) node is selected for each grid based on the level of trust. The CH node determines the minimum number of active nodes per grid and regulates node activity. Together with the active nodes, the CH node identifies and tracks the target. In addition, the CH node informs the surrounding clusters that the target may cross. This concept enhances the accuracy of detection. Utilizing task cycle scheduling and a clustering approach, this work significantly increases the network's lifespan. The performance of the suggested work is justified in terms of detection accuracy, energy consumption, and network lifetime. The experimental findings demonstrate the effectiveness of the proposed method.
无线传感器网络(WSN)的一个显著用途是目标检测和跟踪。目标跟踪系统的主要目标是提高目标跟踪精度和网络寿命。提出了一种用于WSN的可信目标跟踪方案。整个网络区域被分成几个大小相等的网格,每个网格作为一个集群。所有网格都包含相同数量的节点。根据信任级别为每个网格选择一个簇头(CH)节点。CH节点确定每个网格活动节点的最小数量,并调节节点活动。与活动节点一起,CH节点识别并跟踪目标。此外,CH节点通知周围的集群目标可能会穿过。这一概念提高了检测的准确性。利用任务周期调度和集群方法,这项工作显著提高了网络的寿命。从检测精度、能耗和网络寿命方面来看,建议工作的性能是合理的。实验结果证明了该方法的有效性。
{"title":"Energy Efficient Trustworthy Target Tracking Scheme (3TS) based on Clustering and Task Cycle Scheduling for Wireless Sensor Networks","authors":"S. Sebastian, G. Jagatheeshkumar","doi":"10.22247/ijcna/2023/221904","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221904","url":null,"abstract":"– One of the notable uses of Wireless Sensor Networks (WSN) is target detection and tracking. The primary objectives of a target tracking system are to improve target tracking precision and network longevity. This paper presents a Trustworthy Target Tracking Scheme (3TS) for WSN. The entire network region is divided into several grids of equal size, with each grid functioning as a cluster. All the grids include the same number of nodes. A Cluster Head (CH) node is selected for each grid based on the level of trust. The CH node determines the minimum number of active nodes per grid and regulates node activity. Together with the active nodes, the CH node identifies and tracks the target. In addition, the CH node informs the surrounding clusters that the target may cross. This concept enhances the accuracy of detection. Utilizing task cycle scheduling and a clustering approach, this work significantly increases the network's lifespan. The performance of the suggested work is justified in terms of detection accuracy, energy consumption, and network lifetime. The experimental findings demonstrate the effectiveness of the proposed method.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44924911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Tristate Security Mechanism to Protect Against Selective Forwarding Attack and Black Hole Attack in Intra-Cluster Multi-Hop Communication 簇内多跳通信中抵御选择性转发攻击和黑洞攻击的鲁棒三态安全机制
Q4 Computer Science Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221900
A. Anitha, S. Mythili
– Security is the most vital issue to be addressed in Wireless Sensor Networks (WSNs). The WSN dominates since it has an effectiveness of applications in numerous fields. Though it has effectiveness towards its applications likewise it is susceptible to two different kinds of attacks (i.e.) external attacks and internal attacks existence of constrained reckoning resources, low memory, inadequate battery lifetime, handling control, and nonexistence of interfere resilient packet. Handle internal attacks such as selective forwarding attacks (SFAs) and black hole attacks (BHA) are considered to be the most common security extortions in wireless sensor networks. The attacker nodes will execute mischievous activities during data communication by creating traffic load, delaying packet delivery, dropping packets selectively or dropping all packets, energy consumption, and depleting all network resources. These attacks can be handled efficiently by implementing the proposed methodology for detecting, preventing, and recovering Cluster Heads (CHs), Cluster Members (CMs), and Transient Nodes (TNs) from SFAs and BHA in intra-cluster multi-hop. It is accomplished by proposing a robust strategy for overcoming internal attacks on cluster head, cluster member, and transient node. The Fuzzy C-Means clustering is used to discover the prominent cluster head. The uncertainty entropy model is used to detect internal attacks by removing the malicious node from the transition path. The intermediate node is been selected based on the degree and dimension. The experimental results of the proposed Robust Tristate Security Mechanism (RTSSM) against SFAs and BHA are evaluated with packet delivery ratio, throughput, and packet drop and the results prove the effectiveness of the proposed methodology and it also aids in the extension of the network lifetime.
–安全性是无线传感器网络(WSN)中需要解决的最重要问题。WSN占主导地位,因为它在许多领域都有有效的应用。尽管它对其应用同样有效,但它容易受到两种不同类型的攻击(即外部攻击和内部攻击)——存在受限的计算资源、低内存、电池寿命不足、处理控制和不存在干扰弹性分组。处理内部攻击,如选择性转发攻击(SFAs)和黑洞攻击(BHA)被认为是无线传感器网络中最常见的安全勒索。攻击者节点会在数据通信过程中通过创建流量负载、延迟数据包传递、选择性丢弃数据包或丢弃所有数据包、能耗和耗尽所有网络资源来执行恶意活动。通过实现所提出的用于在簇内多跳中从SFA和BHA检测、预防和恢复簇头(CH)、簇成员(CM)和瞬态节点(TN)的方法,可以有效地处理这些攻击。它是通过提出一种强大的策略来克服对簇头、簇成员和瞬态节点的内部攻击来实现的。模糊C均值聚类用于发现显著的簇头。不确定性熵模型用于通过从转移路径中移除恶意节点来检测内部攻击。中间节点是根据阶数和尺寸选择的。针对SFAs和BHA,对所提出的鲁棒三态安全机制(RTSSM)的实验结果进行了分组传递率、吞吐量和分组丢弃的评估,结果证明了所提出方法的有效性,并有助于延长网络寿命。
{"title":"Robust Tristate Security Mechanism to Protect Against Selective Forwarding Attack and Black Hole Attack in Intra-Cluster Multi-Hop Communication","authors":"A. Anitha, S. Mythili","doi":"10.22247/ijcna/2023/221900","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221900","url":null,"abstract":"– Security is the most vital issue to be addressed in Wireless Sensor Networks (WSNs). The WSN dominates since it has an effectiveness of applications in numerous fields. Though it has effectiveness towards its applications likewise it is susceptible to two different kinds of attacks (i.e.) external attacks and internal attacks existence of constrained reckoning resources, low memory, inadequate battery lifetime, handling control, and nonexistence of interfere resilient packet. Handle internal attacks such as selective forwarding attacks (SFAs) and black hole attacks (BHA) are considered to be the most common security extortions in wireless sensor networks. The attacker nodes will execute mischievous activities during data communication by creating traffic load, delaying packet delivery, dropping packets selectively or dropping all packets, energy consumption, and depleting all network resources. These attacks can be handled efficiently by implementing the proposed methodology for detecting, preventing, and recovering Cluster Heads (CHs), Cluster Members (CMs), and Transient Nodes (TNs) from SFAs and BHA in intra-cluster multi-hop. It is accomplished by proposing a robust strategy for overcoming internal attacks on cluster head, cluster member, and transient node. The Fuzzy C-Means clustering is used to discover the prominent cluster head. The uncertainty entropy model is used to detect internal attacks by removing the malicious node from the transition path. The intermediate node is been selected based on the degree and dimension. The experimental results of the proposed Robust Tristate Security Mechanism (RTSSM) against SFAs and BHA are evaluated with packet delivery ratio, throughput, and packet drop and the results prove the effectiveness of the proposed methodology and it also aids in the extension of the network lifetime.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41714938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Controller Scheme for Autonomous Navigation in Infotainment on Internet-of-Vehicles 车联网信息娱乐中自主导航的优化控制器方案
Q4 Computer Science Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221882
R. S, C. .
– The infotainment system curves an innovative mechanism of essential information dissemination for ensuring driving safety and improved driving experiences. However, there are significant challenges in developing an infotainment system to fit into the operational design of advanced technology, e.g
–信息娱乐系统提供了一种创新的基本信息传播机制,以确保驾驶安全和改善驾驶体验。然而,在开发适合先进技术的操作设计的信息娱乐系统方面存在重大挑战,例如
{"title":"Optimized Controller Scheme for Autonomous Navigation in Infotainment on Internet-of-Vehicles","authors":"R. S, C. .","doi":"10.22247/ijcna/2023/221882","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221882","url":null,"abstract":"– The infotainment system curves an innovative mechanism of essential information dissemination for ensuring driving safety and improved driving experiences. However, there are significant challenges in developing an infotainment system to fit into the operational design of advanced technology, e.g","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41853942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Intelligent Water Drop Algorithm Optimized Routing (EIWDR) for Quality of Service Enhancement in Internet of Things-Based Wireless Sensor Networks (IWSN) 增强型智能水滴算法优化路由(EIWDR)用于增强基于物联网的无线传感器网络(IWSN)的服务质量
Q4 Computer Science Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221889
D. Deepalakshmi, B. Pushpa
– The Internet of Things (IoT) has transformed how humans engage with technology, allowing pervasive connection and data sharing. In the Wireless Sensor Networks (WSNs) framework, IoT-based applications have been created for several areas, including agriculture, where greenhouse automation has been deployed for enhanced agricultural yields. However, WSNs face significant challenges, such as limited resources, unpredictable communication, and energy consumption. These issues become more pronounced when applied to greenhouse agriculture due to interference, congestion, and quality of service (QoS) requirements. Therefore, efficient routing protocols are crucial to address these challenges. The proposed study addresses the routing issues in IoT-based WSNs (IWSN) for greenhouse agriculture. Specifically, the Enhanced Intelligent Water Drop Algorithm Optimized Routing (EIWDR) is proposed as a novel routing protocol to enhance the QoS in IoT-based WSNs. The EIWDR protocol utilizes the intelligent water drop algorithm to optimize the routing path selection. The algorithm prioritizes energy-efficient routing, selects the most reliable path with minimum delay and data loss, and balances network load to prevent congestion. The proposed protocol also uses a modified weight function to improve the routing performance when applied in IWSN. To test the efficacy of the EIWDR, simulation tests were conducted in the NS-3 simulator. The EIWDR protocol fares better regarding network lifetime, packet delivery ratio, energy consumption, and packet delay than other routing protocols. Improved greenhouse agricultural quality of service using IWSN is possible with the help of the proposed EIWDR protocol. With the help of intelligent routing algorithms, network resources are used effectively, data is sent reliably, and overall performance is enhanced.
–物联网(IoT)改变了人类参与技术的方式,允许普遍的连接和数据共享。在无线传感器网络(WSN)框架中,已经为几个领域创建了基于物联网的应用程序,包括农业,在农业中部署了温室自动化以提高农业产量。然而,无线传感器网络面临着巨大的挑战,如资源有限、通信不可预测和能源消耗。由于干扰、拥塞和服务质量(QoS)要求,这些问题在应用于温室农业时变得更加明显。因此,高效的路由协议对于解决这些挑战至关重要。拟议的研究解决了用于温室农业的基于物联网的无线传感器网络(IWSN)中的路由问题。具体而言,提出了增强型智能水滴算法优化路由(EIWDR)作为一种新的路由协议,以提高基于物联网的无线传感器网络的QoS。EIWDR协议利用智能水滴算法来优化路由路径选择。该算法优先考虑节能路由,选择延迟和数据丢失最小的最可靠路径,并平衡网络负载以防止拥塞。当应用于IWSN时,所提出的协议还使用修改的权重函数来提高路由性能。为了测试EIWDR的有效性,在NS-3模拟器中进行了模拟测试。与其他路由协议相比,EIWDR协议在网络寿命、数据包传输率、能耗和数据包延迟方面表现更好。在所提出的EIWDR协议的帮助下,使用IWSN提高温室农业服务质量是可能的。在智能路由算法的帮助下,有效地利用了网络资源,可靠地发送了数据,并提高了整体性能。
{"title":"Enhanced Intelligent Water Drop Algorithm Optimized Routing (EIWDR) for Quality of Service Enhancement in Internet of Things-Based Wireless Sensor Networks (IWSN)","authors":"D. Deepalakshmi, B. Pushpa","doi":"10.22247/ijcna/2023/221889","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221889","url":null,"abstract":"– The Internet of Things (IoT) has transformed how humans engage with technology, allowing pervasive connection and data sharing. In the Wireless Sensor Networks (WSNs) framework, IoT-based applications have been created for several areas, including agriculture, where greenhouse automation has been deployed for enhanced agricultural yields. However, WSNs face significant challenges, such as limited resources, unpredictable communication, and energy consumption. These issues become more pronounced when applied to greenhouse agriculture due to interference, congestion, and quality of service (QoS) requirements. Therefore, efficient routing protocols are crucial to address these challenges. The proposed study addresses the routing issues in IoT-based WSNs (IWSN) for greenhouse agriculture. Specifically, the Enhanced Intelligent Water Drop Algorithm Optimized Routing (EIWDR) is proposed as a novel routing protocol to enhance the QoS in IoT-based WSNs. The EIWDR protocol utilizes the intelligent water drop algorithm to optimize the routing path selection. The algorithm prioritizes energy-efficient routing, selects the most reliable path with minimum delay and data loss, and balances network load to prevent congestion. The proposed protocol also uses a modified weight function to improve the routing performance when applied in IWSN. To test the efficacy of the EIWDR, simulation tests were conducted in the NS-3 simulator. The EIWDR protocol fares better regarding network lifetime, packet delivery ratio, energy consumption, and packet delay than other routing protocols. Improved greenhouse agricultural quality of service using IWSN is possible with the help of the proposed EIWDR protocol. With the help of intelligent routing algorithms, network resources are used effectively, data is sent reliably, and overall performance is enhanced.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48995452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Secure and Optimized Execution Pattern Analysis Based O-HMACSHA 3 Resource Allocation in Cloud Environment 一种基于O-HMACSHA-3的云环境下安全优化混合执行模式分析
Q4 Computer Science Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221890
.. Himanshu, N. Mangla
– According to the analysis, several task scheduling methods have been implemented, such as the Particle Swarm Optimization (PSO) method, which has enhanced the performance of cloud data centers (DCs) in terms of various scheduling metrics. The scheduling issue in cloud computing (CC) is well-known to be NP-hard, with the main challenge arising from the exponential increase in the no. of possible outcomes or groupings as the problem size grows. Therefore, the key aim is to determine secure and optimal solutions for scheduling consumer tasks. In this study, a proposed method called Optimized-Hybrid Medium Access Control Secure Hash Algorithm 3 (O-HMACSHA3) is introduced for CC. The investigation aims to address the issue of reliable resource scheduling access for different tasks in the cloud environment, with a focus on reducing turnaround time (TAT) and energy consumption (EC). The proposed method utilizes optimization with PSO to achieve soft security in resource scheduling. To evaluate its effectiveness, the research method is compared with other task scheduling methods, including PSO and Fruit Fly-Based Simulated Annealing Optimization (FSAO) method, in terms of EC and time. The findings indicate significant improvements in performance metrics, with energy consumption reduced to 47.7 joules and TAT decreased to 316 milliseconds compared to existing methods. This is in contrast to the proposed method, which resulted in 57.3 joules and 479 milliseconds, respectively, for 20 tasks.
—根据分析,目前已经实现了几种任务调度方法,例如PSO (Particle Swarm Optimization)方法,该方法在各种调度指标方面增强了云数据中心的性能。众所周知,云计算(CC)中的调度问题是np难题,其主要挑战来自于数据量的指数级增长。随着问题规模的增长,可能的结果或分组。因此,关键目标是确定用于调度使用者任务的安全和最优解决方案。在本研究中,提出了一种称为优化混合介质访问控制安全哈希算法3 (O-HMACSHA3)的CC方法。该研究旨在解决云环境中不同任务的可靠资源调度访问问题,重点是减少周转时间(TAT)和能耗(EC)。该方法利用粒子群优化实现资源调度的软安全。为了评估其有效性,将研究方法与其他任务调度方法(包括粒子群算法和基于果蝇的模拟退火优化(FSAO)方法)在EC和时间方面进行了比较。研究结果表明,与现有方法相比,性能指标有了显着改善,能耗降低到47.7焦耳,TAT降低到316毫秒。这与提出的方法形成对比,该方法对20个任务分别产生57.3焦耳和479毫秒。
{"title":"A Hybrid Secure and Optimized Execution Pattern Analysis Based O-HMACSHA 3 Resource Allocation in Cloud Environment","authors":".. Himanshu, N. Mangla","doi":"10.22247/ijcna/2023/221890","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221890","url":null,"abstract":"– According to the analysis, several task scheduling methods have been implemented, such as the Particle Swarm Optimization (PSO) method, which has enhanced the performance of cloud data centers (DCs) in terms of various scheduling metrics. The scheduling issue in cloud computing (CC) is well-known to be NP-hard, with the main challenge arising from the exponential increase in the no. of possible outcomes or groupings as the problem size grows. Therefore, the key aim is to determine secure and optimal solutions for scheduling consumer tasks. In this study, a proposed method called Optimized-Hybrid Medium Access Control Secure Hash Algorithm 3 (O-HMACSHA3) is introduced for CC. The investigation aims to address the issue of reliable resource scheduling access for different tasks in the cloud environment, with a focus on reducing turnaround time (TAT) and energy consumption (EC). The proposed method utilizes optimization with PSO to achieve soft security in resource scheduling. To evaluate its effectiveness, the research method is compared with other task scheduling methods, including PSO and Fruit Fly-Based Simulated Annealing Optimization (FSAO) method, in terms of EC and time. The findings indicate significant improvements in performance metrics, with energy consumption reduced to 47.7 joules and TAT decreased to 316 milliseconds compared to existing methods. This is in contrast to the proposed method, which resulted in 57.3 joules and 479 milliseconds, respectively, for 20 tasks.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43769118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Enhanced Authorization Protocol in Blockchain for Personal Health Information Management System b区块链中个人健康信息管理系统的增强授权协议
Q4 Computer Science Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221885
Thakur Saikumari, Grinson George
Blockchain and cloud-edge computing paradigms have gradually evolved as a profitable alternative for managing patient data in clinical Internet-of-Things (IoT) devices. Various studies are presented to secure medical records in IoT devices using blockchain schemes. Amongst, eHealthChain is developed to handle medical records obtained from clinical IoT systems. It utilizes Hyperledger Fabric as a blockchain policy to accumulate private medical records. The client's medical record is collected by utilizing the OAuth 2.0 protocol that guarantees the client's authority. Besides, a Message Queuing Telemetry Transport (MQTT) protocol is applied to communicate within an IoT platform. The reliability of the medical data is guaranteed by a consensus method called Kafka. However, the standard OAuth 2.0 protocol neglects the client security problem. Though MQTT offers many-to-many transmissions, the restricted sleep time of devices related to the fixed query waiting is ineffective for resource-constrained networks. Hence, the major contributions of this article are: (i) to develop an Enhanced OAuth (EOAuth) 2.0-based protocol which solves the client security problem and (ii) to utilize a protocol called Constrained Application Protocol (CoAP) for reliable transmission. It reduces the user verification time by obtaining more trusted clients according to their trust level. Also, a certified security service is employed to get the client’s input securely and conduct the cryptographic processes. Finally, the implementation findings exhibit that the EOAuth and CoAP achieve higher efficiency than the standard protocols. Index Terms – Blockchain, Cloud-Edge Computing, IoT Networks, eHealthChain, OAuth 2.0, MQTT, Consensus, CoAP, Kafka.
区块链和云边缘计算模式已逐渐发展成为临床物联网(IoT)设备中管理患者数据的一种有利可图的替代方案。针对使用区块链方案在物联网设备中保护医疗记录的问题,进行了各种研究。其中,eHealthChain是为处理从临床物联网系统获得的医疗记录而开发的。它利用Hyperledger Fabric作为区块链策略来积累私人医疗记录。客户的医疗记录是通过使用OAuth 2.0协议来收集的,该协议保证了客户的权威性。此外,消息队列遥测传输(MQTT)协议被应用于物联网平台内的通信。医学数据的可靠性是通过一种称为Kafka的共识方法来保证的。然而,标准的OAuth 2.0协议忽略了客户端安全问题。尽管MQTT提供了多对多传输,但与固定查询等待相关的设备的受限睡眠时间对于资源受限的网络来说是无效的。因此,本文的主要贡献是:(i)开发了一种基于增强型OAuth(EOAuth)2.0的协议,该协议解决了客户端安全问题;(ii)利用一种称为约束应用协议(CoAP)的协议进行可靠传输。它通过根据信任级别获得更多受信任的客户端来减少用户验证时间。此外,还采用了经过认证的安全服务来安全地获取客户端的输入并执行加密过程。最后,实现结果表明,EOAuth和CoAP实现了比标准协议更高的效率。索引术语–区块链、云边缘计算、物联网网络、eHealthChain、OAuth 2.0、MQTT、Consensus、CoAP、Kafka。
{"title":"An Enhanced Authorization Protocol in Blockchain for Personal Health Information Management System","authors":"Thakur Saikumari, Grinson George","doi":"10.22247/ijcna/2023/221885","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221885","url":null,"abstract":"Blockchain and cloud-edge computing paradigms have gradually evolved as a profitable alternative for managing patient data in clinical Internet-of-Things (IoT) devices. Various studies are presented to secure medical records in IoT devices using blockchain schemes. Amongst, eHealthChain is developed to handle medical records obtained from clinical IoT systems. It utilizes Hyperledger Fabric as a blockchain policy to accumulate private medical records. The client's medical record is collected by utilizing the OAuth 2.0 protocol that guarantees the client's authority. Besides, a Message Queuing Telemetry Transport (MQTT) protocol is applied to communicate within an IoT platform. The reliability of the medical data is guaranteed by a consensus method called Kafka. However, the standard OAuth 2.0 protocol neglects the client security problem. Though MQTT offers many-to-many transmissions, the restricted sleep time of devices related to the fixed query waiting is ineffective for resource-constrained networks. Hence, the major contributions of this article are: (i) to develop an Enhanced OAuth (EOAuth) 2.0-based protocol which solves the client security problem and (ii) to utilize a protocol called Constrained Application Protocol (CoAP) for reliable transmission. It reduces the user verification time by obtaining more trusted clients according to their trust level. Also, a certified security service is employed to get the client’s input securely and conduct the cryptographic processes. Finally, the implementation findings exhibit that the EOAuth and CoAP achieve higher efficiency than the standard protocols. Index Terms – Blockchain, Cloud-Edge Computing, IoT Networks, eHealthChain, OAuth 2.0, MQTT, Consensus, CoAP, Kafka.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43617708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Energy-Efficient Hybrid Protocol (I-EEHP) to Maximize Energy Conservation in Wireless Sensor Networks 在无线传感器网络中实现节能最大化的改进节能混合协议(I-EEHP)
Q4 Computer Science Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221901
S. Arockiaraj, Krishanamoorthi Makkithaya, Harishchandra Hebbar N.
– Nodes running on small batteries in a wireless sensor network (WSN) act as sensors, monitors, and controllers for the entire system. In IoT contexts, these sensor nodes are increasingly common for monitoring, measurement, and control. Minimizing the sensor nodes' energy consumption is essential for maximizing energy conservation and extending the nodes' lifespan. Prolonging the lifetime of a WSN helps cut down on the cost needed to replace or redeploy it. According to reviews of the literature, most of the energy is used for routing and data transfer. This article suggests an "Improved Energy-Efficient Hybrid Protocol (I-EEHP) to Maximize Energy Conservation in Wireless Sensor Networks" that combines these two elements to maximize energy efficiency in order to reduce the energy consumption resulting from routing and data transfer. The data transfer method of an "Energy Efficient Hybrid Protocol (EEHP)" is modified to design the I-EEHP. The I-EEHP uses a multihop hierarchical communication method to reduce energy usage. This makes the routing more energy efficient. In addition, this protocol uses a technique based on IEEE 802.15.4 CSMA/CA to exchange data between cluster members, cluster heads, and sink nodes. This aids in node energy conservation, which ultimately increases the lifespan of the network. The efficiency of the proposed I-EEHP was compared with the already existing LEACH, EEHC, and EEHP using the simulation results. The I-EEHP exhibits noteworthy enhancements in network performance with regards to lifetime, energy, overhead, and packet delivery. The I-EEHP is a feasible option for low-cost and low-power WSN applications.
—在无线传感器网络(WSN)中,使用小电池运行的节点充当整个系统的传感器、监视器和控制器。在物联网环境中,这些传感器节点越来越多地用于监测、测量和控制。最小化传感器节点的能量消耗是最大限度地节约能源和延长节点寿命的关键。延长WSN的使用寿命有助于降低更换或重新部署WSN所需的成本。根据文献综述,大部分能量用于路由和数据传输。本文提出了一种“改进的节能混合协议(I-EEHP),以最大限度地节约无线传感器网络的能源”,该协议结合了这两个元素,以最大限度地提高能源效率,从而减少路由和数据传输带来的能源消耗。对“能效混合协议”(Energy Efficient Hybrid Protocol, EEHP)的数据传输方法进行了改进,设计了I-EEHP。I-EEHP使用多跳分层通信方法来减少能耗。这使得路由更加节能。此外,该协议使用基于IEEE 802.15.4 CSMA/CA的技术在集群成员、簇头和汇聚节点之间交换数据。这有助于节点的能量节约,最终增加网络的寿命。利用仿真结果将所提出的I-EEHP与现有的LEACH、EEHC和EEHP进行了效率比较。I-EEHP在网络性能、生命周期、能量、开销和数据包传递方面表现出显著的增强。I-EEHP是低成本、低功耗WSN应用的可行选择。
{"title":"Improved Energy-Efficient Hybrid Protocol (I-EEHP) to Maximize Energy Conservation in Wireless Sensor Networks","authors":"S. Arockiaraj, Krishanamoorthi Makkithaya, Harishchandra Hebbar N.","doi":"10.22247/ijcna/2023/221901","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221901","url":null,"abstract":"– Nodes running on small batteries in a wireless sensor network (WSN) act as sensors, monitors, and controllers for the entire system. In IoT contexts, these sensor nodes are increasingly common for monitoring, measurement, and control. Minimizing the sensor nodes' energy consumption is essential for maximizing energy conservation and extending the nodes' lifespan. Prolonging the lifetime of a WSN helps cut down on the cost needed to replace or redeploy it. According to reviews of the literature, most of the energy is used for routing and data transfer. This article suggests an \"Improved Energy-Efficient Hybrid Protocol (I-EEHP) to Maximize Energy Conservation in Wireless Sensor Networks\" that combines these two elements to maximize energy efficiency in order to reduce the energy consumption resulting from routing and data transfer. The data transfer method of an \"Energy Efficient Hybrid Protocol (EEHP)\" is modified to design the I-EEHP. The I-EEHP uses a multihop hierarchical communication method to reduce energy usage. This makes the routing more energy efficient. In addition, this protocol uses a technique based on IEEE 802.15.4 CSMA/CA to exchange data between cluster members, cluster heads, and sink nodes. This aids in node energy conservation, which ultimately increases the lifespan of the network. The efficiency of the proposed I-EEHP was compared with the already existing LEACH, EEHC, and EEHP using the simulation results. The I-EEHP exhibits noteworthy enhancements in network performance with regards to lifetime, energy, overhead, and packet delivery. The I-EEHP is a feasible option for low-cost and low-power WSN applications.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45243256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game Theory Application for Misbehavior Detection and Prediction in VANET: Review and Challenges 博弈论在VANET中不良行为检测与预测中的应用:综述与挑战
Q4 Computer Science Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221903
M. Nabil, Abdelmajid Hajam, Omar Boutkhoum, A. Haqiq
– The particular features of vehicular ad hoc networks (VANETs) make them very vulnerable to attacks, especially when these latter become frequent and have intelligent behaviors. For these, the security of vehicular ad hoc networks is substantially important to protect them from the misbehavior of cyber-attacks. Game theory is one of the important tools that have been proposed to accurately model and analyze attack misbehavior. This paper presents a review of game theory-based intrusion detection, prediction, and reaction in VANETs for enriching the literature and helping design a new game theory-based framework. It gives state-of-the-art of game theory-based frameworks by showing their advantages and weaknesses against attacks. In addition, it determines their players and strategies, the proposed solutions and their descriptions, and the types of attacks envisaged. Then, it treats the challenges of designing an efficient framework for intrusion detection, prediction, and reaction against attacks.
-车辆自组织网络(vanet)的特殊功能使其非常容易受到攻击,特别是当这些攻击变得频繁并且具有智能行为时。对于这些,车辆自组织网络的安全性对于保护它们免受网络攻击的不当行为非常重要。博弈论是准确建模和分析攻击不当行为的重要工具之一。本文对VANETs中基于博弈论的入侵检测、预测和反应进行了综述,以丰富文献并帮助设计一个新的基于博弈论的框架。它给出了最先进的博弈论为基础的框架,展示了他们的优势和弱点对抗攻击。此外,它确定了他们的球员和战略,提出的解决方案和他们的描述,以及攻击的类型设想。然后,它处理了设计一个有效的入侵检测、预测和攻击反应框架的挑战。
{"title":"Game Theory Application for Misbehavior Detection and Prediction in VANET: Review and Challenges","authors":"M. Nabil, Abdelmajid Hajam, Omar Boutkhoum, A. Haqiq","doi":"10.22247/ijcna/2023/221903","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221903","url":null,"abstract":"– The particular features of vehicular ad hoc networks (VANETs) make them very vulnerable to attacks, especially when these latter become frequent and have intelligent behaviors. For these, the security of vehicular ad hoc networks is substantially important to protect them from the misbehavior of cyber-attacks. Game theory is one of the important tools that have been proposed to accurately model and analyze attack misbehavior. This paper presents a review of game theory-based intrusion detection, prediction, and reaction in VANETs for enriching the literature and helping design a new game theory-based framework. It gives state-of-the-art of game theory-based frameworks by showing their advantages and weaknesses against attacks. In addition, it determines their players and strategies, the proposed solutions and their descriptions, and the types of attacks envisaged. Then, it treats the challenges of designing an efficient framework for intrusion detection, prediction, and reaction against attacks.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44252286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Analysis of Cluster-Based Dynamic Multipath Trust Secure Routing (DMTSR)-Protocol in Wireless Sensor Networks (WSNs) 无线传感器网络中基于簇的动态多径信任安全路由协议的性能分析
Q4 Computer Science Pub Date : 2023-06-30 DOI: 10.22247/ijcna/2023/221891
Darshan B. D., P. C. R.
– A wireless sensor network [WSN] analyses the structured information supplied from the base station for the hostile environment. The primary drawback of WSN is Security since the sensors are placed in a closed network. WSNs are primarily disrupted by a variety of harmful ‘internal and external’ attacks. Due to these attacks, the leading resources in the networks, like power and memory, will be drained early. To overcome these problems, propose a novel protocol: Dynamic Multipath Trust Secure Routing Protocol (DMTSR) with Advanced AAODV protocol. For encryption and decryption purposes, Advanced Encryption Algorithms [AES] are used to help the above protocol. The fastest path is found to a destination from the source node by considering the neighbour node's energy level and energy consumption of the node. It can reduce packet loss and improve the packet_ delivery ratio. DMTSRP and AAODV protocols are merged to develop an innovative approach to routing the information. The DMTSR will give a layer-by-layer explanation. The source node's primary job is to identify the path by considering the neighbour node and approaches for the primary keys. Source nodes begin updating intermediate nodes in secured regions using an AES encryption algorithm. The DMTSR protocol replaces packets of data. The DMTSR protocol uses a secondary_key to substitute an intermediate node, where the secured data is received at the final nodes. The simulation outcomes of the DMTSR protocol achieve a 92% Packet_Delivery_Rate, Throughput of 97%, and a delay is 0.278ms in the network.
无线传感器网络(WSN)分析来自基站的结构化信息,以应对恶劣环境。WSN的主要缺点是安全性,因为传感器被放置在一个封闭的网络中。无线传感器网络主要受到各种有害的“内部和外部”攻击的破坏。由于这些攻击,网络中的主要资源,如电力和内存,将提前耗尽。为了克服这些问题,提出了一种新的协议:基于先进AAODV协议的动态多路径信任安全路由协议(DMTSR)。为了加密和解密的目的,高级加密算法[AES]被用来帮助上述协议。通过考虑邻居节点的能量水平和节点的能量消耗,找到从源节点到目的节点的最快路径。它可以减少丢包,提高包的传输率。DMTSRP和AAODV协议合并,开发了一种路由信息的创新方法。DMTSR将逐层解释。源节点的主要任务是通过考虑邻居节点和主键的方法来识别路径。源节点开始使用AES加密算法更新安全区域中的中间节点。DMTSR协议替换数据包。DMTSR协议使用secondary_key代替中间节点,在中间节点上,最终节点接收受保护的数据。仿真结果表明,DMTSR协议在网络中的Packet_Delivery_Rate为92%,吞吐量为97%,时延为0.278ms。
{"title":"Performance Analysis of Cluster-Based Dynamic Multipath Trust Secure Routing (DMTSR)-Protocol in Wireless Sensor Networks (WSNs)","authors":"Darshan B. D., P. C. R.","doi":"10.22247/ijcna/2023/221891","DOIUrl":"https://doi.org/10.22247/ijcna/2023/221891","url":null,"abstract":"– A wireless sensor network [WSN] analyses the structured information supplied from the base station for the hostile environment. The primary drawback of WSN is Security since the sensors are placed in a closed network. WSNs are primarily disrupted by a variety of harmful ‘internal and external’ attacks. Due to these attacks, the leading resources in the networks, like power and memory, will be drained early. To overcome these problems, propose a novel protocol: Dynamic Multipath Trust Secure Routing Protocol (DMTSR) with Advanced AAODV protocol. For encryption and decryption purposes, Advanced Encryption Algorithms [AES] are used to help the above protocol. The fastest path is found to a destination from the source node by considering the neighbour node's energy level and energy consumption of the node. It can reduce packet loss and improve the packet_ delivery ratio. DMTSRP and AAODV protocols are merged to develop an innovative approach to routing the information. The DMTSR will give a layer-by-layer explanation. The source node's primary job is to identify the path by considering the neighbour node and approaches for the primary keys. Source nodes begin updating intermediate nodes in secured regions using an AES encryption algorithm. The DMTSR protocol replaces packets of data. The DMTSR protocol uses a secondary_key to substitute an intermediate node, where the secured data is received at the final nodes. The simulation outcomes of the DMTSR protocol achieve a 92% Packet_Delivery_Rate, Throughput of 97%, and a delay is 0.278ms in the network.","PeriodicalId":36485,"journal":{"name":"International Journal of Computer Networks and Applications","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44418747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computer Networks and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1