首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
Cyber-physical-based welding systems: Components and implementation strategies 基于网络物理的焊接系统:组件和实施策略
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-01 DOI: 10.1049/cps2.12092
József Szőlősi, Péter Magyar, József Antal, Béla J. Szekeres, Gábor Farkas, Mátyás Andó

The conditions for a feasible Cyber-Physical System (CPS) in a welding environment are explored for the manufacturing technology components while also focusing on machine learning tools. Increasing manufacturing efficiency means making digitalisation feasible for all technologies, including welding, given today's challenges. Early versions of manufacturing management, such as Computer Integrated Manufacturing, are already leading the way, and one of the latest milestones in these developments is CPS. It can be shown that the digital migration of specific sub-domains (e.g. visual inspection of the weld seam during quality assurance) is significantly more challenging and unimaginable without artificial intelligence applications. However, it is also true that the full integration needed to achieve autonomous manufacturing has yet to be fully achieved, although there is a strong demand in the industry for these CPS to work. In some areas, the digital switchover has already been prepared. However, the interconnection of these subsystems requires modern information systems or, in the case of existing ones, their upgrading to the appropriate level. This research area is set to be addressed comprehensively by initiating several projects. In the initial phase, the aim is to develop an architecture that integrates the various Information Technology applications. In this work, the digital manufacturing environment under CPS is studied, the relevant components are explored, the conditions for the transition from traditional to CPS-based manufacturing are examined and examples of planned further specific studies on the components are listed.

针对制造技术组件,同时关注机器学习工具,探讨了焊接环境中可行的网络物理系统(CPS)的条件。鉴于当今的挑战,提高制造效率意味着使包括焊接在内的所有技术的数字化变得可行。早期的制造管理,如计算机集成制造,已经在这方面取得了领先地位,而这些发展的最新里程碑之一就是 CPS。事实证明,如果没有人工智能的应用,特定子领域的数字化迁移(例如在质量保证过程中对焊缝进行目视检查)将面临更大的挑战和难以想象的困难。然而,实现自主制造所需的全面集成也确实尚未完全实现,尽管业界对这些 CPS 的工作有着强烈的需求。在某些领域,数字转换已经准备就绪。然而,这些子系统之间的相互连接需要现代化的信息系统,或者在现有信息系统的情况下,将其升级到适当的水平。这一研究领域将通过启动几个项目来全面解决。在初始阶段,我们的目标是开发一个能整合各种信息技术应用的架构。在这项工作中,研究了 CPS 下的数字化制造环境,探讨了相关组件,审查了从传统制造向基于 CPS 的制造过渡的条件,并列举了计划对各组件进行进一步具体研究的实例。
{"title":"Cyber-physical-based welding systems: Components and implementation strategies","authors":"József Szőlősi,&nbsp;Péter Magyar,&nbsp;József Antal,&nbsp;Béla J. Szekeres,&nbsp;Gábor Farkas,&nbsp;Mátyás Andó","doi":"10.1049/cps2.12092","DOIUrl":"10.1049/cps2.12092","url":null,"abstract":"<p>The conditions for a feasible Cyber-Physical System (CPS) in a welding environment are explored for the manufacturing technology components while also focusing on machine learning tools. Increasing manufacturing efficiency means making digitalisation feasible for all technologies, including welding, given today's challenges. Early versions of manufacturing management, such as Computer Integrated Manufacturing, are already leading the way, and one of the latest milestones in these developments is CPS. It can be shown that the digital migration of specific sub-domains (e.g. visual inspection of the weld seam during quality assurance) is significantly more challenging and unimaginable without artificial intelligence applications. However, it is also true that the full integration needed to achieve autonomous manufacturing has yet to be fully achieved, although there is a strong demand in the industry for these CPS to work. In some areas, the digital switchover has already been prepared. However, the interconnection of these subsystems requires modern information systems or, in the case of existing ones, their upgrading to the appropriate level. This research area is set to be addressed comprehensively by initiating several projects. In the initial phase, the aim is to develop an architecture that integrates the various Information Technology applications. In this work, the digital manufacturing environment under CPS is studied, the relevant components are explored, the conditions for the transition from traditional to CPS-based manufacturing are examined and examples of planned further specific studies on the components are listed.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"293-312"},"PeriodicalIF":1.7,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141049823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SEIR-driven semantic integration framework: Internet of Things-enhanced epidemiological surveillance in COVID-19 outbreaks using recurrent neural networks SEIR 驱动的语义整合框架:利用递归神经网络在 COVID-19 疫情爆发中加强物联网流行病学监测
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-17 DOI: 10.1049/cps2.12091
Saket Sarin, Sunil K. Singh, Sudhakar Kumar, Shivam Goyal, Brij B. Gupta, Varsha Arya, Kwok Tai Chui

With the current COVID-19 pandemic, sophisticated epidemiological surveillance systems are more important than ever because conventional approaches have not been able to handle the scope and complexity of this global emergency. In response to this challenge, the authors present the state-of-the-art SEIR-Driven Semantic Integration Framework (SDSIF), which leverages the Internet of Things (IoT) to handle a variety of data sources. The primary innovation of SDSIF is the development of an extensive COVID-19 ontology, which makes unmatched data interoperability and semantic inference possible. The framework facilitates not only real-time data integration but also advanced analytics, anomaly detection, and predictive modelling through the use of Recurrent Neural Networks (RNNs). By being scalable and flexible enough to fit into different healthcare environments and geographical areas, SDSIF is revolutionising epidemiological surveillance for COVID-19 outbreak management. Metrics such as Mean Absolute Error (MAE) and Mean sqḋ Error (MSE) are used in a rigorous evaluation. The evaluation also includes an exceptional R-squared score, which attests to the effectiveness and ingenuity of SDSIF. Notably, a modest RMSE value of 8.70 highlights its accuracy, while a low MSE of 3.03 highlights its high predictive precision. The framework's remarkable R-squared score of 0.99 emphasises its resilience in explaining variations in disease data even more.

在当前 COVID-19 大流行的情况下,复杂的流行病学监测系统比以往任何时候都更加重要,因为传统方法无法应对这一全球紧急事件的范围和复杂性。为了应对这一挑战,作者提出了最先进的 SEIR 驱动语义集成框架(SDSIF),该框架利用物联网(IoT)处理各种数据源。SDSIF 的主要创新之处在于开发了一个广泛的 COVID-19 本体,使无与伦比的数据互操作性和语义推理成为可能。该框架不仅有助于实时数据集成,还能通过使用循环神经网络(RNN)进行高级分析、异常检测和预测建模。SDSIF 具有可扩展性和灵活性,能够适应不同的医疗保健环境和地理区域,为 COVID-19 的疫情管理带来了一场流行病学监测的革命。平均绝对误差 (MAE) 和平均平方误差 (MSE) 等指标被用于严格的评估。评估还包括一个出色的 R 平方得分,这证明了 SDSIF 的有效性和独创性。值得注意的是,8.70 的 RMSE 值适中,凸显了其准确性,而 3.03 的 MSE 值较低,凸显了其较高的预测精度。该框架的 R 方值高达 0.99,更加凸显了其在解释疾病数据变化时的弹性。
{"title":"SEIR-driven semantic integration framework: Internet of Things-enhanced epidemiological surveillance in COVID-19 outbreaks using recurrent neural networks","authors":"Saket Sarin,&nbsp;Sunil K. Singh,&nbsp;Sudhakar Kumar,&nbsp;Shivam Goyal,&nbsp;Brij B. Gupta,&nbsp;Varsha Arya,&nbsp;Kwok Tai Chui","doi":"10.1049/cps2.12091","DOIUrl":"10.1049/cps2.12091","url":null,"abstract":"<p>With the current COVID-19 pandemic, sophisticated epidemiological surveillance systems are more important than ever because conventional approaches have not been able to handle the scope and complexity of this global emergency. In response to this challenge, the authors present the state-of-the-art SEIR-Driven Semantic Integration Framework (SDSIF), which leverages the Internet of Things (IoT) to handle a variety of data sources. The primary innovation of SDSIF is the development of an extensive COVID-19 ontology, which makes unmatched data interoperability and semantic inference possible. The framework facilitates not only real-time data integration but also advanced analytics, anomaly detection, and predictive modelling through the use of Recurrent Neural Networks (RNNs). By being scalable and flexible enough to fit into different healthcare environments and geographical areas, SDSIF is revolutionising epidemiological surveillance for COVID-19 outbreak management. Metrics such as Mean Absolute Error (MAE) and Mean sqḋ Error (MSE) are used in a rigorous evaluation. The evaluation also includes an exceptional R-squared score, which attests to the effectiveness and ingenuity of SDSIF. Notably, a modest RMSE value of 8.70 highlights its accuracy, while a low MSE of 3.03 highlights its high predictive precision. The framework's remarkable R-squared score of 0.99 emphasises its resilience in explaining variations in disease data even more.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"135-149"},"PeriodicalIF":1.5,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140694681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A machine learning model for Alzheimer's disease prediction 预测阿尔茨海默病的机器学习模型
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-20 DOI: 10.1049/cps2.12090
Pooja Rani, Rohit Lamba, Ravi Kumar Sachdeva, Karan Kumar, Celestine Iwendi

Alzheimer’s disease (AD) is a neurodegenerative disorder that mostly affects old aged people. Its symptoms are initially mild, but they get worse over time. Although this health disease has no cure, its early diagnosis can help to reduce its impacts. A methodology SMOTE-RF is proposed for AD prediction. Alzheimer's is predicted using machine learning algorithms. Performances of three algorithms decision tree, extreme gradient boosting (XGB), and random forest (RF) are evaluated in prediction. Open Access Series of Imaging Studies longitudinal dataset available on Kaggle is used for experiments. The dataset is balanced using synthetic minority oversampling technique. Experiments are done on both imbalanced and balanced datasets. Decision tree obtained 73.38% accuracy, XGB obtained 83.88% accuracy and RF obtained a maximum of 87.84% accuracy on the imbalanced dataset. Decision tree obtained 83.15% accuracy, XGB obtained 91.05% accuracy and RF obtained maximum 95.03% accuracy on the balanced dataset. A maximum accuracy of 95.03% is achieved with SMOTE-RF.

阿尔茨海默病(AD)是一种神经退行性疾病,主要影响老年人。其症状最初比较轻微,但随着时间的推移会越来越严重。虽然这种疾病无法治愈,但早期诊断有助于减少其影响。本文提出了一种用于预测阿尔茨海默病的方法 SMOTE-RF。使用机器学习算法预测阿尔茨海默氏症。评估了决策树、极梯度提升(XGB)和随机森林(RF)三种算法在预测中的表现。实验使用了 Kaggle 上的开放获取系列成像研究纵向数据集。该数据集使用合成少数超采样技术进行平衡。实验同时在不平衡和平衡数据集上进行。在不平衡数据集上,决策树获得了 73.38% 的准确率,XGB 获得了 83.88% 的准确率,RF 获得了最高 87.84% 的准确率。在平衡数据集上,决策树获得了 83.15% 的准确率,XGB 获得了 91.05% 的准确率,RF 获得了最高 95.03% 的准确率。SMOTE-RF 的最高准确率为 95.03%。
{"title":"A machine learning model for Alzheimer's disease prediction","authors":"Pooja Rani,&nbsp;Rohit Lamba,&nbsp;Ravi Kumar Sachdeva,&nbsp;Karan Kumar,&nbsp;Celestine Iwendi","doi":"10.1049/cps2.12090","DOIUrl":"10.1049/cps2.12090","url":null,"abstract":"<p>Alzheimer’s disease (AD) is a neurodegenerative disorder that mostly affects old aged people. Its symptoms are initially mild, but they get worse over time. Although this health disease has no cure, its early diagnosis can help to reduce its impacts. A methodology SMOTE-RF is proposed for AD prediction. Alzheimer's is predicted using machine learning algorithms. Performances of three algorithms decision tree, extreme gradient boosting (XGB), and random forest (RF) are evaluated in prediction. Open Access Series of Imaging Studies longitudinal dataset available on Kaggle is used for experiments. The dataset is balanced using synthetic minority oversampling technique. Experiments are done on both imbalanced and balanced datasets. Decision tree obtained 73.38% accuracy, XGB obtained 83.88% accuracy and RF obtained a maximum of 87.84% accuracy on the imbalanced dataset. Decision tree obtained 83.15% accuracy, XGB obtained 91.05% accuracy and RF obtained maximum 95.03% accuracy on the balanced dataset. A maximum accuracy of 95.03% is achieved with SMOTE-RF.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"125-134"},"PeriodicalIF":1.5,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140227957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the Internet of Medical Things with ECG-based PUF encryption 利用基于心电图的 PUF 加密技术确保医疗物联网的安全
IF 1.5 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-08 DOI: 10.1049/cps2.12089
Biagio Boi, Christian Esposito

The Internet of Things (IoT) is revolutionizing the healthcare industry by enhancing personalized patient care. However, the transmission of sensitive health data in IoT systems presents significant security and privacy challenges, further exacerbated by the difficulty of exploiting traditional protection means due to poor battery equipment and limited storage and computational capabilities of IoT devices. The authors analyze techniques applied in the medical context to encrypt sensible data and deal with the unique challenges of resource-constrained devices. A technique that is facing increasing interest is the Physical Unclonable Function (PUF), where biometrics are implemented on integrated circuits' electric features. PUFs, however, demand special hardware, so in this work, instead of considering the physical device as a source of randomness, an ElectroCardioGram (ECG) can be taken into consideration to make a ‘virtual’ PUF. Such an mechanism leverages individual ECG signals to generate a cryptographic key for encrypting and decrypting data. Due to the poor stability of the ECG signal and the typical noise existing in the measurement process for such a signal, filtering and feature extraction techniques must be adopted. The proposed model considers the adoption of pre-processing techniques in conjunction with a fuzzy extractor to add stability to the signal. Experiments were performed on a dataset containing ECG records gathered over 6 months, yielding good results in the short term and valuable outcomes in the long term, paving the way for adaptive PUF techniques in this context.

物联网(IoT)通过加强对患者的个性化护理,正在彻底改变医疗保健行业。然而,在物联网系统中传输敏感健康数据带来了巨大的安全和隐私挑战,由于物联网设备的电池设备差、存储和计算能力有限,难以利用传统的保护手段,从而进一步加剧了这一挑战。作者分析了应用于医疗领域的技术,以加密敏感数据并应对资源受限设备的独特挑战。物理不可克隆函数(PUF)是一种越来越受关注的技术,生物识别技术是在集成电路的电气特性上实现的。然而,PUF 需要特殊的硬件,因此在这项工作中,我们不再将物理设备作为随机性的来源,而是将心电图(ECG)作为 "虚拟 "PUF 的考虑因素。这种机制利用单个心电信号生成加密密钥,用于加密和解密数据。由于心电信号的稳定性较差,而且在测量过程中存在典型的噪声,因此必须采用滤波和特征提取技术。建议的模型考虑采用预处理技术和模糊提取器,以增加信号的稳定性。实验是在一个包含 6 个月心电图记录的数据集上进行的,在短期内取得了良好的结果,并在长期内取得了有价值的成果,为自适应 PUF 技术在这种情况下的应用铺平了道路。
{"title":"Securing the Internet of Medical Things with ECG-based PUF encryption","authors":"Biagio Boi,&nbsp;Christian Esposito","doi":"10.1049/cps2.12089","DOIUrl":"10.1049/cps2.12089","url":null,"abstract":"<p>The Internet of Things (IoT) is revolutionizing the healthcare industry by enhancing personalized patient care. However, the transmission of sensitive health data in IoT systems presents significant security and privacy challenges, further exacerbated by the difficulty of exploiting traditional protection means due to poor battery equipment and limited storage and computational capabilities of IoT devices. The authors analyze techniques applied in the medical context to encrypt sensible data and deal with the unique challenges of resource-constrained devices. A technique that is facing increasing interest is the Physical Unclonable Function (PUF), where biometrics are implemented on integrated circuits' electric features. PUFs, however, demand special hardware, so in this work, instead of considering the physical device as a source of randomness, an ElectroCardioGram (ECG) can be taken into consideration to make a ‘virtual’ PUF. Such an mechanism leverages individual ECG signals to generate a cryptographic key for encrypting and decrypting data. Due to the poor stability of the ECG signal and the typical noise existing in the measurement process for such a signal, filtering and feature extraction techniques must be adopted. The proposed model considers the adoption of pre-processing techniques in conjunction with a fuzzy extractor to add stability to the signal. Experiments were performed on a dataset containing ECG records gathered over 6 months, yielding good results in the short term and valuable outcomes in the long term, paving the way for adaptive PUF techniques in this context.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"115-124"},"PeriodicalIF":1.5,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140257509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Petri net model for Time-Delay Attack detection in Precision Time Protocol-based networks 基于精确时间协议网络的时延攻击检测 Petri 网模型
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-27 DOI: 10.1049/cps2.12088
Mohsen Moradi, Amir Hossein Jahangir

Along with the development of industrial and distributed systems, security concerns have also emerged in industrial communication protocols. PTP, Precision Time Protocol, is one of the most precise time synchronisation protocols for industrial devices. It ensures real-time activity of the industrial control systems with precision equal to microseconds. In order to address the actual or potential security issues of PTP, this article firstly describes attack models applicable to PTP and then focuses on applying Coloured Petri Net to formally analyse the attack detection methods and also model PTP. The alignment of simulation results with the model and the considered assumptions show the suitability and accuracy of the proposed model.

随着工业和分布式系统的发展,工业通信协议也出现了安全问题。PTP(精确时间协议)是工业设备最精确的时间同步协议之一。它确保工业控制系统的实时活动精确到微秒级。为了解决 PTP 实际或潜在的安全问题,本文首先介绍了适用于 PTP 的攻击模型,然后重点应用彩色 Petri 网正式分析攻击检测方法,并对 PTP 进行建模。仿真结果与模型和所考虑的假设的一致性表明了所提出模型的适用性和准确性。
{"title":"A Petri net model for Time-Delay Attack detection in Precision Time Protocol-based networks","authors":"Mohsen Moradi,&nbsp;Amir Hossein Jahangir","doi":"10.1049/cps2.12088","DOIUrl":"10.1049/cps2.12088","url":null,"abstract":"<p>Along with the development of industrial and distributed systems, security concerns have also emerged in industrial communication protocols. PTP, Precision Time Protocol, is one of the most precise time synchronisation protocols for industrial devices. It ensures real-time activity of the industrial control systems with precision equal to microseconds. In order to address the actual or potential security issues of PTP, this article firstly describes attack models applicable to PTP and then focuses on applying Coloured Petri Net to formally analyse the attack detection methods and also model PTP. The alignment of simulation results with the model and the considered assumptions show the suitability and accuracy of the proposed model.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"407-423"},"PeriodicalIF":1.7,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140426605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging graph clustering techniques for cyber-physical system analysis to enhance disturbance characterisation 利用图聚类技术进行网络物理系统分析,加强干扰特征描述
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-17 DOI: 10.1049/cps2.12087
Nicholas Jacobs, Shamina Hossain-McKenzie, Shining Sun, Emily Payne, Adam Summers, Leen Al-Homoud, Astrid Layton, Kate Davis, Chris Goes

Cyber-physical systems have behaviour that crosses domain boundaries during events such as planned operational changes and malicious disturbances. Traditionally, the cyber and physical systems are monitored separately and use very different toolsets and analysis paradigms. The security and privacy of these cyber-physical systems requires improved understanding of the combined cyber-physical system behaviour and methods for holistic analysis. Therefore, the authors propose leveraging clustering techniques on cyber-physical data from smart grid systems to analyse differences and similarities in behaviour during cyber-, physical-, and cyber-physical disturbances. Since clustering methods are commonly used in data science to examine statistical similarities in order to sort large datasets, these algorithms can assist in identifying useful relationships in cyber-physical systems. Through this analysis, deeper insights can be shared with decision-makers on what cyber and physical components are strongly or weakly linked, what cyber-physical pathways are most traversed, and the criticality of certain cyber-physical nodes or edges. This paper presents several types of clustering methods for cyber-physical graphs of smart grid systems and their application in assessing different types of disturbances for informing cyber-physical situational awareness. The collection of these clustering techniques provide a foundational basis for cyber-physical graph interdependency analysis.

网络物理系统在发生计划的操作变更和恶意干扰等事件时,其行为会跨越领域边界。传统上,网络系统和物理系统是分开监控的,使用的工具集和分析范式也大相径庭。要确保这些网络物理系统的安全性和隐私性,就必须更好地了解网络物理系统的综合行为和整体分析方法。因此,作者建议利用智能电网系统网络物理数据的聚类技术,分析网络、物理和网络物理干扰期间行为的异同。由于聚类方法通常用于数据科学,以检查统计相似性,从而对大型数据集进行分类,因此这些算法可帮助识别网络物理系统中的有用关系。通过这种分析,决策者可以更深入地了解哪些网络和物理组件之间的联系较强或较弱,哪些网络物理路径最易被穿越,以及某些网络物理节点或边缘的关键性。本文介绍了智能电网系统网络物理图的几种聚类方法,以及它们在评估不同类型干扰以提供网络物理态势感知方面的应用。这些聚类技术为网络物理图相互依存分析提供了基础。
{"title":"Leveraging graph clustering techniques for cyber-physical system analysis to enhance disturbance characterisation","authors":"Nicholas Jacobs,&nbsp;Shamina Hossain-McKenzie,&nbsp;Shining Sun,&nbsp;Emily Payne,&nbsp;Adam Summers,&nbsp;Leen Al-Homoud,&nbsp;Astrid Layton,&nbsp;Kate Davis,&nbsp;Chris Goes","doi":"10.1049/cps2.12087","DOIUrl":"10.1049/cps2.12087","url":null,"abstract":"<p>Cyber-physical systems have behaviour that crosses domain boundaries during events such as planned operational changes and malicious disturbances. Traditionally, the cyber and physical systems are monitored separately and use very different toolsets and analysis paradigms. The security and privacy of these cyber-physical systems requires improved understanding of the combined cyber-physical system behaviour and methods for holistic analysis. Therefore, the authors propose leveraging clustering techniques on cyber-physical data from smart grid systems to analyse differences and similarities in behaviour during cyber-, physical-, and cyber-physical disturbances. Since clustering methods are commonly used in data science to examine statistical similarities in order to sort large datasets, these algorithms can assist in identifying useful relationships in cyber-physical systems. Through this analysis, deeper insights can be shared with decision-makers on what cyber and physical components are strongly or weakly linked, what cyber-physical pathways are most traversed, and the criticality of certain cyber-physical nodes or edges. This paper presents several types of clustering methods for cyber-physical graphs of smart grid systems and their application in assessing different types of disturbances for informing cyber-physical situational awareness. The collection of these clustering techniques provide a foundational basis for cyber-physical graph interdependency analysis.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"392-406"},"PeriodicalIF":1.7,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12087","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139960393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Status, challenges, and promises of data-driven battery lifetime prediction under cyber-physical system context 网络物理系统背景下数据驱动电池寿命预测的现状、挑战和前景
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-31 DOI: 10.1049/cps2.12086
Yang Liu, Sihui Chen, Peiyi Li, Jiayu Wan, Xin Li

Energy storage is playing an increasingly important role in the modern world as sustainability is becoming a critical issue. Within this domain, rechargeable battery is gaining significant popularity as it has been adopted to serve as the power supplier in a broad range of application scenarios, such as cyber-physical system (CPS), due to multiple advantages. On the other hand, battery inspection and management solutions have been constructed based on the CPS architecture in order to guarantee the quality, reliability and safety of rechargeable batteries. In specific, lifetime prediction is extensively studied in recent research as it can help assess the quality and health status to facilitate the manufacturing and maintenance. Due to the aforementioned importance, the authors aim to conduct a comprehensive survey on the data-driven techniques for battery lifetime prediction, including their current status, challenges and promises. In contrast to existing literature, the battery lifetime prediction methods are studied under CPS context in this survey. Hence, the authors focus on the algorithms for lifetime prediction as well as the engineering frameworks that enable the data acquisition and deployment of prediction models in CPS systems. Through this survey, the authors intend to investigate both academic and practical values in the domain of battery lifetime prediction to benefit both researchers and practitioners.

随着可持续发展成为一个关键问题,能源存储在现代社会中发挥着越来越重要的作用。在这一领域,可充电电池因其多种优势,在网络物理系统(CPS)等广泛的应用场景中被用作电源供应器,因而大受欢迎。另一方面,为了保证充电电池的质量、可靠性和安全性,人们基于 CPS 架构构建了电池检测和管理解决方案。具体而言,寿命预测有助于评估电池的质量和健康状况,从而促进电池的生产和维护,因此在最近的研究中得到了广泛的研究。鉴于上述重要性,作者旨在对电池寿命预测的数据驱动技术进行全面调查,包括其现状、挑战和前景。与现有文献不同的是,本调查是在 CPS 背景下研究电池寿命预测方法。因此,作者重点研究了电池寿命预测算法,以及在 CPS 系统中获取数据和部署预测模型的工程框架。通过本次调查,作者希望调查电池寿命预测领域的学术价值和实用价值,使研究人员和从业人员都能从中受益。
{"title":"Status, challenges, and promises of data-driven battery lifetime prediction under cyber-physical system context","authors":"Yang Liu,&nbsp;Sihui Chen,&nbsp;Peiyi Li,&nbsp;Jiayu Wan,&nbsp;Xin Li","doi":"10.1049/cps2.12086","DOIUrl":"10.1049/cps2.12086","url":null,"abstract":"<p>Energy storage is playing an increasingly important role in the modern world as sustainability is becoming a critical issue. Within this domain, rechargeable battery is gaining significant popularity as it has been adopted to serve as the power supplier in a broad range of application scenarios, such as cyber-physical system (CPS), due to multiple advantages. On the other hand, battery inspection and management solutions have been constructed based on the CPS architecture in order to guarantee the quality, reliability and safety of rechargeable batteries. In specific, lifetime prediction is extensively studied in recent research as it can help assess the quality and health status to facilitate the manufacturing and maintenance. Due to the aforementioned importance, the authors aim to conduct a comprehensive survey on the data-driven techniques for battery lifetime prediction, including their current status, challenges and promises. In contrast to existing literature, the battery lifetime prediction methods are studied under CPS context in this survey. Hence, the authors focus on the algorithms for lifetime prediction as well as the engineering frameworks that enable the data acquisition and deployment of prediction models in CPS systems. Through this survey, the authors intend to investigate both academic and practical values in the domain of battery lifetime prediction to benefit both researchers and practitioners.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"207-217"},"PeriodicalIF":1.7,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12086","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140471755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870-5-104 用于监控和数据采集入侵检测系统的过采样和欠采样 IEC 60870-5-104
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-04 DOI: 10.1049/cps2.12085
M. Agus Syamsul Arifin, Deris Stiawan, Bhakti Yudho Suprapto, Susanto Susanto, Tasmi Salim, Mohd Yazid Idris, Rahmat Budiarto

Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems as security tools are necessary for ensuring security. Machine learning-based intrusion detection systems require datasets with balanced class distribution, but in practice, imbalanced class distribution is unavoidable. A dataset created by running a supervisory control and data acquisition IEC 60870-5-104 (IEC 104) protocol on a testbed network is presented. The dataset includes normal and attacks traffic data such as port scan, brute force, and Denial of service attacks. Various types of Denial of service attacks are generated to create a robust and specific dataset for training the intrusion detection system model. Three popular techniques for handling class imbalance, that is, random over-sampling, random under-sampling, and synthetic minority oversampling, are implemented to select the best dataset for the experiment. Gradient boosting, decision tree, and random forest algorithms are used as classifiers for the intrusion detection system models. Experimental results indicate that the intrusion detection system model using decision tree and random forest classifiers using random under-sampling achieved the highest accuracy of 99.05%. The intrusion detection system model's performance is verified using various metrics such as recall, precision, F1-Score, receiver operating characteristics curves, and area under the curve. Additionally, 10-fold cross-validation shows no indication of overfitting in the created intrusion detection system model.

在工业 4.0 中,监控和数据采集系统对于控制和监测工业流程至关重要。然而,这些系统很容易受到各种攻击,因此,作为安全工具的智能、强大的入侵检测系统对确保安全十分必要。基于机器学习的入侵检测系统需要类分布均衡的数据集,但在实际应用中,类分布不均衡的情况不可避免。本文介绍了在测试平台网络上运行监督控制和数据采集 IEC 60870-5-104 (IEC 104)协议所创建的数据集。数据集包括正常和攻击流量数据,如端口扫描、暴力和拒绝服务攻击。生成各种类型的拒绝服务攻击,是为了创建一个健壮的特定数据集,用于训练入侵检测系统模型。为了选择最佳的实验数据集,我们采用了三种处理类不平衡的流行技术,即随机过度采样、随机采样不足和合成少数过度采样。梯度提升、决策树和随机森林算法被用作入侵检测系统模型的分类器。实验结果表明,使用决策树和随机森林分类器的入侵检测系统模型在随机欠采样的情况下达到了 99.05% 的最高准确率。入侵检测系统模型的性能通过各种指标来验证,如召回率、精确度、F1 分数、接收器工作特性曲线和曲线下面积。此外,10 倍交叉验证表明所创建的入侵检测系统模型没有过拟合迹象。
{"title":"Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870-5-104","authors":"M. Agus Syamsul Arifin,&nbsp;Deris Stiawan,&nbsp;Bhakti Yudho Suprapto,&nbsp;Susanto Susanto,&nbsp;Tasmi Salim,&nbsp;Mohd Yazid Idris,&nbsp;Rahmat Budiarto","doi":"10.1049/cps2.12085","DOIUrl":"10.1049/cps2.12085","url":null,"abstract":"<p>Supervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems as security tools are necessary for ensuring security. Machine learning-based intrusion detection systems require datasets with balanced class distribution, but in practice, imbalanced class distribution is unavoidable. A dataset created by running a supervisory control and data acquisition IEC 60870-5-104 (IEC 104) protocol on a testbed network is presented. The dataset includes normal and attacks traffic data such as port scan, brute force, and Denial of service attacks. Various types of Denial of service attacks are generated to create a robust and specific dataset for training the intrusion detection system model. Three popular techniques for handling class imbalance, that is, random over-sampling, random under-sampling, and synthetic minority oversampling, are implemented to select the best dataset for the experiment. Gradient boosting, decision tree, and random forest algorithms are used as classifiers for the intrusion detection system models. Experimental results indicate that the intrusion detection system model using decision tree and random forest classifiers using random under-sampling achieved the highest accuracy of 99.05%. The intrusion detection system model's performance is verified using various metrics such as recall, precision, F1-Score, receiver operating characteristics curves, and area under the curve. Additionally, 10-fold cross-validation shows no indication of overfitting in the created intrusion detection system model.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"282-292"},"PeriodicalIF":1.7,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139386040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile detection of cataracts with an optimised lightweight deep Edge Intelligent technique 利用优化的轻量级深度边缘智能技术移动检测白内障
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-01 DOI: 10.1049/cps2.12083
Dipta Neogi, Mahirul Alam Chowdhury, Mst. Moriom Akter, Md. Ishan Arefin Hossain

Testing the visual field is a valuable diagnostic tool for identifying eye conditions such as cataract, glaucoma, and retinal disease. Its quick and straightforward testing process has become an essential component in our efforts to prevent blindness. Still, the device must be accessible to the general masses. This research has developed a machine learning model that can work with Edge devices like smartphones. As a result, it is opening the opportunity to integrate the disease-detecting model into multiple Edge devices to automate their operation. The authors intend to use convolutional neural network (CNN) and deep learning to deduce which optimisers have the best results when detecting cataracts from live photos of eyes. This is done by comparing different models and optimisers. Using these methods, a reliable model can be obtained that detects cataracts. The proposed TensorFlow Lite model constructed by combining CNN layers and Adam in this study is called Optimised Light Weight Sequential Deep Learning Model (SDLM). SDLM is trained using a smaller number of CNN layers and parameters, which gives SDLM its compatibility, fast execution time, and low memory requirements. The proposed Android app, I-Scan, uses SDLM in the form of TensorFlow Lite for demonstration of the model in Edge devices.

视野测试是识别白内障、青光眼和视网膜疾病等眼部疾病的重要诊断工具。其快速、直接的测试过程已成为我们防盲工作的重要组成部分。不过,该设备必须能够为普通大众所使用。这项研究开发了一种机器学习模型,可与智能手机等边缘设备配合使用。因此,它为将疾病检测模型集成到多个 Edge 设备中实现自动化操作提供了机会。作者打算利用卷积神经网络(CNN)和深度学习来推断出哪种优化器在从眼睛的实时照片中检测白内障时效果最好。这是通过比较不同的模型和优化器来实现的。利用这些方法,可以获得检测白内障的可靠模型。在本研究中,通过结合 CNN 层和亚当构建的 TensorFlow Lite 模型被称为优化轻量级序列深度学习模型(SDLM)。SDLM 使用较少的 CNN 层数和参数进行训练,因此具有兼容性强、执行时间快、内存需求低等特点。拟议的安卓应用程序 I-Scan 使用 TensorFlow Lite 形式的 SDLM,以便在 Edge 设备中演示该模型。
{"title":"Mobile detection of cataracts with an optimised lightweight deep Edge Intelligent technique","authors":"Dipta Neogi,&nbsp;Mahirul Alam Chowdhury,&nbsp;Mst. Moriom Akter,&nbsp;Md. Ishan Arefin Hossain","doi":"10.1049/cps2.12083","DOIUrl":"10.1049/cps2.12083","url":null,"abstract":"<p>Testing the visual field is a valuable diagnostic tool for identifying eye conditions such as cataract, glaucoma, and retinal disease. Its quick and straightforward testing process has become an essential component in our efforts to prevent blindness. Still, the device must be accessible to the general masses. This research has developed a machine learning model that can work with Edge devices like smartphones. As a result, it is opening the opportunity to integrate the disease-detecting model into multiple Edge devices to automate their operation. The authors intend to use convolutional neural network (CNN) and deep learning to deduce which optimisers have the best results when detecting cataracts from live photos of eyes. This is done by comparing different models and optimisers. Using these methods, a reliable model can be obtained that detects cataracts. The proposed TensorFlow Lite model constructed by combining CNN layers and Adam in this study is called Optimised Light Weight Sequential Deep Learning Model (SDLM). SDLM is trained using a smaller number of CNN layers and parameters, which gives SDLM its compatibility, fast execution time, and low memory requirements. The proposed Android app, I-Scan, uses SDLM in the form of TensorFlow Lite for demonstration of the model in Edge devices.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"269-281"},"PeriodicalIF":1.7,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12083","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139394799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time implementation for vulnerability of power components under switching attack based on sliding mode
IF 1.7 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-29 DOI: 10.1049/cps2.12084
Seema Yadav, Nand Kishor, Shubhi Purwar, Saikat Chakrabarti, Petra Raussi, Avinash Kumar

In recent years, cyber security-related studies in the power grid have drawn wide attention, with much focus on its detection, mainly for data injection type of attacks. The vulnerability of power components as a result of attack and their impact on generator dynamics have been largely ignored so far. With the aim of addressing some of these issues, the authors propose a novel approach using real-time sliding surface-based switching attack (SA) construction. This approach targets the circuit breaker, excitation system, and governor system of the generator. The vulnerability of these power components to cyber-physical attacks and assessment of their potential impact on the stability of generator are discussed. The study is presented to show the progression of cascading generator dynamics on account of single or multiple time instants of SA launched on these power components. The results are discussed according to criteria in terms of deviations in rotor speed of the generator and identify some of possible combinations of power components that are most critical to grid stability. The proposed study is implemented on standard IEEE 3-machine, 9-bus network in real-time digital simulator via transmission control protocol/internet protocol (TCP/IP) communication network established as cyber-physical system. The sliding surface-based SA algorithm developed in MATLAB is launched from another computer.

{"title":"Real-time implementation for vulnerability of power components under switching attack based on sliding mode","authors":"Seema Yadav,&nbsp;Nand Kishor,&nbsp;Shubhi Purwar,&nbsp;Saikat Chakrabarti,&nbsp;Petra Raussi,&nbsp;Avinash Kumar","doi":"10.1049/cps2.12084","DOIUrl":"https://doi.org/10.1049/cps2.12084","url":null,"abstract":"<p>In recent years, cyber security-related studies in the power grid have drawn wide attention, with much focus on its detection, mainly for data injection type of attacks. The vulnerability of power components as a result of attack and their impact on generator dynamics have been largely ignored so far. With the aim of addressing some of these issues, the authors propose a novel approach using real-time sliding surface-based switching attack (SA) construction. This approach targets the circuit breaker, excitation system, and governor system of the generator. The vulnerability of these power components to cyber-physical attacks and assessment of their potential impact on the stability of generator are discussed. The study is presented to show the progression of cascading generator dynamics on account of single or multiple time instants of SA launched on these power components. The results are discussed according to criteria in terms of deviations in rotor speed of the generator and identify some of possible combinations of power components that are most critical to grid stability. The proposed study is implemented on standard IEEE 3-machine, 9-bus network in real-time digital simulator via transmission control protocol/internet protocol (TCP/IP) communication network established as cyber-physical system. The sliding surface-based SA algorithm developed in MATLAB is launched from another computer.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"375-391"},"PeriodicalIF":1.7,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12084","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1