首页 > 最新文献

IET Cyber-Physical Systems: Theory and Applications最新文献

英文 中文
Cyber-physical system model based on multi-agent system 基于多代理系统的网络物理系统模型
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-12 DOI: 10.1049/cps2.12096
Maqbol Ahmed, Okba Kazar, Saad Harous

Integrating physical processes with computational components creates cyber-physical systems (CPS) that seamlessly interact between the physical and digital worlds. The cyber-physical system has become an interesting research area and an attractive application domain, especially in industry based on the big advantages of this new paradigm. All companies are trying to use this model to control the real industry sector by integrating the cyber system. Many solutions were proposed however, they were not entirely satisfactory. This research proposes a novel CPS model based on Multi-Agent Systems (MAS). This model takes advantage of MAS's collaborative and distributed nature to improve CPS's performance and functionality. Therefore, this model offers a flexible and scalable approach to the development and management of intricate, and interwoven CPSs. The research focuses on developing a CPS model, that encompasses nine layers: the physical agent, security agent, computation agent, decision-making agent, control agent, communication agent, resilience agent, maintenance agent, and application agent layer. The MAS framework is employed to overcome the challenges associated with CPS design, such as coordination, dependability, maintainability, robustness, security, control etc. The results of this exploration are significant in their contribution to the advancement of CPS modelling by utilising Multi-Agent Systems.

网络物理系统(CPS)将物理过程与计算组件集成在一起,实现了物理世界与数字世界的无缝互动。基于这一新模式的巨大优势,网络物理系统已成为一个有趣的研究领域和极具吸引力的应用领域,尤其是在工业领域。所有公司都在尝试使用这种模式,通过整合网络系统来控制实际工业部门。人们提出了许多解决方案,但都不尽如人意。本研究提出了一种基于多代理系统(MAS)的新型 CPS 模型。该模型利用多代理系统的协作性和分布式特性来提高 CPS 的性能和功能。因此,该模型为开发和管理错综复杂、相互交织的 CPS 提供了一种灵活、可扩展的方法。研究重点是开发一种 CPS 模型,包括九个层次:物理代理层、安全代理层、计算代理层、决策代理层、控制代理层、通信代理层、弹性代理层、维护代理层和应用代理层。MAS 框架被用来克服与 CPS 设计相关的挑战,如协调性、可靠性、可维护性、鲁棒性、安全性、控制等。这项探索的成果对于利用多代理系统推进 CPS 建模具有重要意义。
{"title":"Cyber-physical system model based on multi-agent system","authors":"Maqbol Ahmed,&nbsp;Okba Kazar,&nbsp;Saad Harous","doi":"10.1049/cps2.12096","DOIUrl":"10.1049/cps2.12096","url":null,"abstract":"<p>Integrating physical processes with computational components creates cyber-physical systems (CPS) that seamlessly interact between the physical and digital worlds. The cyber-physical system has become an interesting research area and an attractive application domain, especially in industry based on the big advantages of this new paradigm. All companies are trying to use this model to control the real industry sector by integrating the cyber system. Many solutions were proposed however, they were not entirely satisfactory. This research proposes a novel CPS model based on Multi-Agent Systems (MAS). This model takes advantage of MAS's collaborative and distributed nature to improve CPS's performance and functionality. Therefore, this model offers a flexible and scalable approach to the development and management of intricate, and interwoven CPSs. The research focuses on developing a CPS model, that encompasses nine layers: the physical agent, security agent, computation agent, decision-making agent, control agent, communication agent, resilience agent, maintenance agent, and application agent layer. The MAS framework is employed to overcome the challenges associated with CPS design, such as coordination, dependability, maintainability, robustness, security, control etc. The results of this exploration are significant in their contribution to the advancement of CPS modelling by utilising Multi-Agent Systems.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"424-434"},"PeriodicalIF":0.8,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12096","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141352489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing 特邀社论:通过估计计算实现基于物联网的安全健康监测和跟踪
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-30 DOI: 10.1049/cps2.12094
Rocco Zaccagnino, Arcangelo Castiglione, Marek R. Ogiela, Florin Pop, Weizhi Meng
<p>Despite the substantial advancements in health technology, the COVID-19 pandemic has underscored the imperative of enhancing the resilience and efficiency of healthcare systems. Within this context, the Internet of Things (IoT) paradigm emerges as highly pertinent in healthcare services, facilitating enriched doctor-patient interaction while concurrently ameliorating healthcare expenditures. Wearable devices provide patients with personalised access to health-related data, empower physicians with more effective health monitoring capabilities, and enable hospitals to oversee medical equipment, personnel, and infection transmission dynamics. IoT devices, functioning as data aggregators, accumulate extensive datasets, furnishing valuable insights that augment decision-making prowess within healthcare settings. However, the exponential proliferation of IoT devices poses formidable challenges in processing this voluminous and diverse data and extracting actionable insights. Amid the manifold benefits of IoT integration in healthcare services, several hurdles persist, including paramount data security and privacy concerns. Real-time data transmission from IoT devices amplifies these concerns, compounding issues related to data overload and potential inaccuracies. This special issue endeavours to disseminate the latest advancements in IoT within healthcare services. The principal objective is to empower researchers to delve into key concepts conducive to IoT's practical, feasible, and robust integration in healthcare delivery, thereby ensuring expeditious, end-to-end, and dependable service provision to patients.</p><p>In this Special Issue, our attention has been directed towards a spectrum of topics of scientific interest, encompassing artificial intelligence and IoT-based healthcare methodologies tailored for pandemic disease management, the synergy between Cloud computing and IoT-based healthcare infrastructures, the intricacies of IoT-based healthcare networks, the application of IoT for personalised health monitoring, the utilisation of IoT for disease diagnosis, and related domains. This special issue aims to showcase the latest research in IoT-based health monitoring systems and estimated computing. The papers presented here will provide valuable insights and contribute to the ongoing efforts to mitigate the impact of pandemics on public health.</p><p>The papers selected for this Special Issue collectively demonstrate the progressive advancement of scientific inquiry into solutions for IoT-based Secure Health Monitoring and Tracking through Estimated Computing. The pursuit of synergy among disciplines such as Artificial Intelligence, IoT, and Cloud Computing to develop diagnostic systems for diseases and personalised health monitoring stands poised to emerge as a paramount ambition within the scientific community dedicated to advancing societal well-being and health. Thus, the overall submissions were of high quality, which marks the success
引入 SEIR 驱动的语义集成框架 (SDSIF),以应对 COVID-19 大流行所带来的挑战。利用物联网,SDSIF 整合了各种数据源,并以广泛的 COVID-19 本体为特色,增强了数据互操作性和语义推理能力。该框架利用循环神经网络(RNN)实现了实时数据集成、高级分析、异常检测和预测建模。SDSIF 性能卓越,在解释疾病数据变化方面效果显著。Boi 等人讨论了在物联网系统中传输敏感健康数据所面临的安全挑战,并提出了一种新型医疗加密技术。该技术利用物理不可克隆函数(PUF)方法,将心电图信号作为加密的随机性来源。提出的模型包括预处理技术和模糊提取器,以增强信号的稳定性。在为期 6 个月的心电图数据集上进行的实验表明,短期结果很有希望,长期结果也很有价值,为医疗保健物联网系统中的自适应 PUF 技术铺平了道路。它主要关注三个问题:提供一个人类可读的领域、内容节制以及创建一个基于用户声誉的奖励系统。基于以太坊和 Swarm,拟议的架构利用智能合约进行自动规则处理,利用 Swarm 进行分布式存储和网络托管。这样就形成了一个完全去中心化、经过认证和审核的平台,用户可以在这个平台上分享互联网上的内容展示。
{"title":"Guest Editorial: IoT-based secure health monitoring and tracking through estimated computing","authors":"Rocco Zaccagnino,&nbsp;Arcangelo Castiglione,&nbsp;Marek R. Ogiela,&nbsp;Florin Pop,&nbsp;Weizhi Meng","doi":"10.1049/cps2.12094","DOIUrl":"10.1049/cps2.12094","url":null,"abstract":"&lt;p&gt;Despite the substantial advancements in health technology, the COVID-19 pandemic has underscored the imperative of enhancing the resilience and efficiency of healthcare systems. Within this context, the Internet of Things (IoT) paradigm emerges as highly pertinent in healthcare services, facilitating enriched doctor-patient interaction while concurrently ameliorating healthcare expenditures. Wearable devices provide patients with personalised access to health-related data, empower physicians with more effective health monitoring capabilities, and enable hospitals to oversee medical equipment, personnel, and infection transmission dynamics. IoT devices, functioning as data aggregators, accumulate extensive datasets, furnishing valuable insights that augment decision-making prowess within healthcare settings. However, the exponential proliferation of IoT devices poses formidable challenges in processing this voluminous and diverse data and extracting actionable insights. Amid the manifold benefits of IoT integration in healthcare services, several hurdles persist, including paramount data security and privacy concerns. Real-time data transmission from IoT devices amplifies these concerns, compounding issues related to data overload and potential inaccuracies. This special issue endeavours to disseminate the latest advancements in IoT within healthcare services. The principal objective is to empower researchers to delve into key concepts conducive to IoT's practical, feasible, and robust integration in healthcare delivery, thereby ensuring expeditious, end-to-end, and dependable service provision to patients.&lt;/p&gt;&lt;p&gt;In this Special Issue, our attention has been directed towards a spectrum of topics of scientific interest, encompassing artificial intelligence and IoT-based healthcare methodologies tailored for pandemic disease management, the synergy between Cloud computing and IoT-based healthcare infrastructures, the intricacies of IoT-based healthcare networks, the application of IoT for personalised health monitoring, the utilisation of IoT for disease diagnosis, and related domains. This special issue aims to showcase the latest research in IoT-based health monitoring systems and estimated computing. The papers presented here will provide valuable insights and contribute to the ongoing efforts to mitigate the impact of pandemics on public health.&lt;/p&gt;&lt;p&gt;The papers selected for this Special Issue collectively demonstrate the progressive advancement of scientific inquiry into solutions for IoT-based Secure Health Monitoring and Tracking through Estimated Computing. The pursuit of synergy among disciplines such as Artificial Intelligence, IoT, and Cloud Computing to develop diagnostic systems for diseases and personalised health monitoring stands poised to emerge as a paramount ambition within the scientific community dedicated to advancing societal well-being and health. Thus, the overall submissions were of high quality, which marks the success ","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"99-101"},"PeriodicalIF":0.8,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141304297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on detection and localisation of false data injection attacks in smart grids 智能电网中虚假数据注入攻击的检测与定位研究
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-26 DOI: 10.1049/cps2.12093
Muhammad Irfan, Alireza Sadighian, Adeen Tanveer, Shaikha J. Al-Naimi, Gabriele Oligeri

In the recent years, cyberattacks to smart grids are becoming more frequent. Among the many malicious activities that can be launched against smart grids, the False Data Injection (FDI) attacks have raised significant concerns from both academia and industry. FDI attacks can affect the (internal) state estimation process—critical for smart grid monitoring and control—thus being able to bypass conventional Bad Data Detection (BDD) methods. Hence, prompt detection and precise localisation of FDI attacks are becoming of paramount importance to ensure smart grids security and safety. Several papers recently started to study and analyse this topic from different perspectives and address existing challenges. Data-driven techniques and mathematical modelling are the major ingredients of the proposed approaches. The primary objective is to provide a systematic review and insights into FDI attacks joint detection and localisation approaches considering that other surveys mainly concentrated on the detection aspects without detailed coverage of localisation aspects. For this purpose, more than 40 major research contributions were selected and inspected, while conducting a detailed analysis of the methodology and objectives in relation to the FDI attacks detection and localisation. Key findings of the identified papers were provided according to different criteria, such as employed FDI attacks localisation techniques, utilised evaluation scenarios, investigated FDI attack types, application scenarios, adopted methodologies and the use of additional data. Finally, open issues and future research directions were discussed.

近年来,针对智能电网的网络攻击越来越频繁。在针对智能电网的众多恶意活动中,虚假数据注入(FDI)攻击引起了学术界和工业界的极大关注。FDI攻击可以影响(内部)状态估计过程——对智能电网监测和控制至关重要——从而能够绕过传统的坏数据检测(BDD)方法。因此,快速检测和精确定位FDI攻击对于确保智能电网的安全和安全至关重要。最近有几篇论文开始从不同的角度研究和分析这一主题,并解决存在的挑战。数据驱动技术和数学建模是所提出方法的主要组成部分。考虑到其他调查主要集中在检测方面,而没有详细覆盖本地化方面,主要目标是提供对外国直接投资攻击联合检测和本地化方法的系统审查和见解。为此目的,选择和检查了40多个主要研究贡献,同时对与外国直接投资攻击检测和本地化有关的方法和目标进行了详细分析。根据不同的标准提供了已确定论文的主要发现,例如采用的外国直接投资攻击本地化技术,使用的评估场景,调查的外国直接投资攻击类型,应用场景,采用的方法和使用额外的数据。最后,对有待解决的问题和未来的研究方向进行了展望。
{"title":"A survey on detection and localisation of false data injection attacks in smart grids","authors":"Muhammad Irfan,&nbsp;Alireza Sadighian,&nbsp;Adeen Tanveer,&nbsp;Shaikha J. Al-Naimi,&nbsp;Gabriele Oligeri","doi":"10.1049/cps2.12093","DOIUrl":"10.1049/cps2.12093","url":null,"abstract":"<p>In the recent years, cyberattacks to smart grids are becoming more frequent. Among the many malicious activities that can be launched against smart grids, the False Data Injection (FDI) attacks have raised significant concerns from both academia and industry. FDI attacks can affect the (internal) state estimation process—critical for smart grid monitoring and control—thus being able to bypass conventional Bad Data Detection (BDD) methods. Hence, prompt detection and precise localisation of FDI attacks are becoming of paramount importance to ensure smart grids security and safety. Several papers recently started to study and analyse this topic from different perspectives and address existing challenges. Data-driven techniques and mathematical modelling are the major ingredients of the proposed approaches. The primary objective is to provide a systematic review and insights into FDI attacks joint detection and localisation approaches considering that other surveys mainly concentrated on the detection aspects without detailed coverage of localisation aspects. For this purpose, more than 40 major research contributions were selected and inspected, while conducting a detailed analysis of the methodology and objectives in relation to the FDI attacks detection and localisation. Key findings of the identified papers were provided according to different criteria, such as employed FDI attacks localisation techniques, utilised evaluation scenarios, investigated FDI attack types, application scenarios, adopted methodologies and the use of additional data. Finally, open issues and future research directions were discussed.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"313-333"},"PeriodicalIF":0.8,"publicationDate":"2024-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12093","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-physical-based welding systems: Components and implementation strategies 基于网络物理的焊接系统:组件和实施策略
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-05-01 DOI: 10.1049/cps2.12092
József Szőlősi, Péter Magyar, József Antal, Béla J. Szekeres, Gábor Farkas, Mátyás Andó

The conditions for a feasible Cyber-Physical System (CPS) in a welding environment are explored for the manufacturing technology components while also focusing on machine learning tools. Increasing manufacturing efficiency means making digitalisation feasible for all technologies, including welding, given today's challenges. Early versions of manufacturing management, such as Computer Integrated Manufacturing, are already leading the way, and one of the latest milestones in these developments is CPS. It can be shown that the digital migration of specific sub-domains (e.g. visual inspection of the weld seam during quality assurance) is significantly more challenging and unimaginable without artificial intelligence applications. However, it is also true that the full integration needed to achieve autonomous manufacturing has yet to be fully achieved, although there is a strong demand in the industry for these CPS to work. In some areas, the digital switchover has already been prepared. However, the interconnection of these subsystems requires modern information systems or, in the case of existing ones, their upgrading to the appropriate level. This research area is set to be addressed comprehensively by initiating several projects. In the initial phase, the aim is to develop an architecture that integrates the various Information Technology applications. In this work, the digital manufacturing environment under CPS is studied, the relevant components are explored, the conditions for the transition from traditional to CPS-based manufacturing are examined and examples of planned further specific studies on the components are listed.

针对制造技术组件,同时关注机器学习工具,探讨了焊接环境中可行的网络物理系统(CPS)的条件。鉴于当今的挑战,提高制造效率意味着使包括焊接在内的所有技术的数字化变得可行。早期的制造管理,如计算机集成制造,已经在这方面取得了领先地位,而这些发展的最新里程碑之一就是 CPS。事实证明,如果没有人工智能的应用,特定子领域的数字化迁移(例如在质量保证过程中对焊缝进行目视检查)将面临更大的挑战和难以想象的困难。然而,实现自主制造所需的全面集成也确实尚未完全实现,尽管业界对这些 CPS 的工作有着强烈的需求。在某些领域,数字转换已经准备就绪。然而,这些子系统之间的相互连接需要现代化的信息系统,或者在现有信息系统的情况下,将其升级到适当的水平。这一研究领域将通过启动几个项目来全面解决。在初始阶段,我们的目标是开发一个能整合各种信息技术应用的架构。在这项工作中,研究了 CPS 下的数字化制造环境,探讨了相关组件,审查了从传统制造向基于 CPS 的制造过渡的条件,并列举了计划对各组件进行进一步具体研究的实例。
{"title":"Cyber-physical-based welding systems: Components and implementation strategies","authors":"József Szőlősi,&nbsp;Péter Magyar,&nbsp;József Antal,&nbsp;Béla J. Szekeres,&nbsp;Gábor Farkas,&nbsp;Mátyás Andó","doi":"10.1049/cps2.12092","DOIUrl":"10.1049/cps2.12092","url":null,"abstract":"<p>The conditions for a feasible Cyber-Physical System (CPS) in a welding environment are explored for the manufacturing technology components while also focusing on machine learning tools. Increasing manufacturing efficiency means making digitalisation feasible for all technologies, including welding, given today's challenges. Early versions of manufacturing management, such as Computer Integrated Manufacturing, are already leading the way, and one of the latest milestones in these developments is CPS. It can be shown that the digital migration of specific sub-domains (e.g. visual inspection of the weld seam during quality assurance) is significantly more challenging and unimaginable without artificial intelligence applications. However, it is also true that the full integration needed to achieve autonomous manufacturing has yet to be fully achieved, although there is a strong demand in the industry for these CPS to work. In some areas, the digital switchover has already been prepared. However, the interconnection of these subsystems requires modern information systems or, in the case of existing ones, their upgrading to the appropriate level. This research area is set to be addressed comprehensively by initiating several projects. In the initial phase, the aim is to develop an architecture that integrates the various Information Technology applications. In this work, the digital manufacturing environment under CPS is studied, the relevant components are explored, the conditions for the transition from traditional to CPS-based manufacturing are examined and examples of planned further specific studies on the components are listed.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"293-312"},"PeriodicalIF":0.8,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141049823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SEIR-driven semantic integration framework: Internet of Things-enhanced epidemiological surveillance in COVID-19 outbreaks using recurrent neural networks SEIR 驱动的语义整合框架:利用递归神经网络在 COVID-19 疫情爆发中加强物联网流行病学监测
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-17 DOI: 10.1049/cps2.12091
Saket Sarin, Sunil K. Singh, Sudhakar Kumar, Shivam Goyal, Brij B. Gupta, Varsha Arya, Kwok Tai Chui

With the current COVID-19 pandemic, sophisticated epidemiological surveillance systems are more important than ever because conventional approaches have not been able to handle the scope and complexity of this global emergency. In response to this challenge, the authors present the state-of-the-art SEIR-Driven Semantic Integration Framework (SDSIF), which leverages the Internet of Things (IoT) to handle a variety of data sources. The primary innovation of SDSIF is the development of an extensive COVID-19 ontology, which makes unmatched data interoperability and semantic inference possible. The framework facilitates not only real-time data integration but also advanced analytics, anomaly detection, and predictive modelling through the use of Recurrent Neural Networks (RNNs). By being scalable and flexible enough to fit into different healthcare environments and geographical areas, SDSIF is revolutionising epidemiological surveillance for COVID-19 outbreak management. Metrics such as Mean Absolute Error (MAE) and Mean sqḋ Error (MSE) are used in a rigorous evaluation. The evaluation also includes an exceptional R-squared score, which attests to the effectiveness and ingenuity of SDSIF. Notably, a modest RMSE value of 8.70 highlights its accuracy, while a low MSE of 3.03 highlights its high predictive precision. The framework's remarkable R-squared score of 0.99 emphasises its resilience in explaining variations in disease data even more.

在当前 COVID-19 大流行的情况下,复杂的流行病学监测系统比以往任何时候都更加重要,因为传统方法无法应对这一全球紧急事件的范围和复杂性。为了应对这一挑战,作者提出了最先进的 SEIR 驱动语义集成框架(SDSIF),该框架利用物联网(IoT)处理各种数据源。SDSIF 的主要创新之处在于开发了一个广泛的 COVID-19 本体,使无与伦比的数据互操作性和语义推理成为可能。该框架不仅有助于实时数据集成,还能通过使用循环神经网络(RNN)进行高级分析、异常检测和预测建模。SDSIF 具有可扩展性和灵活性,能够适应不同的医疗保健环境和地理区域,为 COVID-19 的疫情管理带来了一场流行病学监测的革命。平均绝对误差 (MAE) 和平均平方误差 (MSE) 等指标被用于严格的评估。评估还包括一个出色的 R 平方得分,这证明了 SDSIF 的有效性和独创性。值得注意的是,8.70 的 RMSE 值适中,凸显了其准确性,而 3.03 的 MSE 值较低,凸显了其较高的预测精度。该框架的 R 方值高达 0.99,更加凸显了其在解释疾病数据变化时的弹性。
{"title":"SEIR-driven semantic integration framework: Internet of Things-enhanced epidemiological surveillance in COVID-19 outbreaks using recurrent neural networks","authors":"Saket Sarin,&nbsp;Sunil K. Singh,&nbsp;Sudhakar Kumar,&nbsp;Shivam Goyal,&nbsp;Brij B. Gupta,&nbsp;Varsha Arya,&nbsp;Kwok Tai Chui","doi":"10.1049/cps2.12091","DOIUrl":"10.1049/cps2.12091","url":null,"abstract":"<p>With the current COVID-19 pandemic, sophisticated epidemiological surveillance systems are more important than ever because conventional approaches have not been able to handle the scope and complexity of this global emergency. In response to this challenge, the authors present the state-of-the-art SEIR-Driven Semantic Integration Framework (SDSIF), which leverages the Internet of Things (IoT) to handle a variety of data sources. The primary innovation of SDSIF is the development of an extensive COVID-19 ontology, which makes unmatched data interoperability and semantic inference possible. The framework facilitates not only real-time data integration but also advanced analytics, anomaly detection, and predictive modelling through the use of Recurrent Neural Networks (RNNs). By being scalable and flexible enough to fit into different healthcare environments and geographical areas, SDSIF is revolutionising epidemiological surveillance for COVID-19 outbreak management. Metrics such as Mean Absolute Error (MAE) and Mean sqḋ Error (MSE) are used in a rigorous evaluation. The evaluation also includes an exceptional R-squared score, which attests to the effectiveness and ingenuity of SDSIF. Notably, a modest RMSE value of 8.70 highlights its accuracy, while a low MSE of 3.03 highlights its high predictive precision. The framework's remarkable R-squared score of 0.99 emphasises its resilience in explaining variations in disease data even more.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"135-149"},"PeriodicalIF":0.8,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12091","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140694681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A machine learning model for Alzheimer's disease prediction 预测阿尔茨海默病的机器学习模型
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-20 DOI: 10.1049/cps2.12090
Pooja Rani, Rohit Lamba, Ravi Kumar Sachdeva, Karan Kumar, Celestine Iwendi

Alzheimer’s disease (AD) is a neurodegenerative disorder that mostly affects old aged people. Its symptoms are initially mild, but they get worse over time. Although this health disease has no cure, its early diagnosis can help to reduce its impacts. A methodology SMOTE-RF is proposed for AD prediction. Alzheimer's is predicted using machine learning algorithms. Performances of three algorithms decision tree, extreme gradient boosting (XGB), and random forest (RF) are evaluated in prediction. Open Access Series of Imaging Studies longitudinal dataset available on Kaggle is used for experiments. The dataset is balanced using synthetic minority oversampling technique. Experiments are done on both imbalanced and balanced datasets. Decision tree obtained 73.38% accuracy, XGB obtained 83.88% accuracy and RF obtained a maximum of 87.84% accuracy on the imbalanced dataset. Decision tree obtained 83.15% accuracy, XGB obtained 91.05% accuracy and RF obtained maximum 95.03% accuracy on the balanced dataset. A maximum accuracy of 95.03% is achieved with SMOTE-RF.

阿尔茨海默病(AD)是一种神经退行性疾病,主要影响老年人。其症状最初比较轻微,但随着时间的推移会越来越严重。虽然这种疾病无法治愈,但早期诊断有助于减少其影响。本文提出了一种用于预测阿尔茨海默病的方法 SMOTE-RF。使用机器学习算法预测阿尔茨海默氏症。评估了决策树、极梯度提升(XGB)和随机森林(RF)三种算法在预测中的表现。实验使用了 Kaggle 上的开放获取系列成像研究纵向数据集。该数据集使用合成少数超采样技术进行平衡。实验同时在不平衡和平衡数据集上进行。在不平衡数据集上,决策树获得了 73.38% 的准确率,XGB 获得了 83.88% 的准确率,RF 获得了最高 87.84% 的准确率。在平衡数据集上,决策树获得了 83.15% 的准确率,XGB 获得了 91.05% 的准确率,RF 获得了最高 95.03% 的准确率。SMOTE-RF 的最高准确率为 95.03%。
{"title":"A machine learning model for Alzheimer's disease prediction","authors":"Pooja Rani,&nbsp;Rohit Lamba,&nbsp;Ravi Kumar Sachdeva,&nbsp;Karan Kumar,&nbsp;Celestine Iwendi","doi":"10.1049/cps2.12090","DOIUrl":"10.1049/cps2.12090","url":null,"abstract":"<p>Alzheimer’s disease (AD) is a neurodegenerative disorder that mostly affects old aged people. Its symptoms are initially mild, but they get worse over time. Although this health disease has no cure, its early diagnosis can help to reduce its impacts. A methodology SMOTE-RF is proposed for AD prediction. Alzheimer's is predicted using machine learning algorithms. Performances of three algorithms decision tree, extreme gradient boosting (XGB), and random forest (RF) are evaluated in prediction. Open Access Series of Imaging Studies longitudinal dataset available on Kaggle is used for experiments. The dataset is balanced using synthetic minority oversampling technique. Experiments are done on both imbalanced and balanced datasets. Decision tree obtained 73.38% accuracy, XGB obtained 83.88% accuracy and RF obtained a maximum of 87.84% accuracy on the imbalanced dataset. Decision tree obtained 83.15% accuracy, XGB obtained 91.05% accuracy and RF obtained maximum 95.03% accuracy on the balanced dataset. A maximum accuracy of 95.03% is achieved with SMOTE-RF.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"125-134"},"PeriodicalIF":0.8,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12090","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140227957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the Internet of Medical Things with ECG-based PUF encryption 利用基于心电图的 PUF 加密技术确保医疗物联网的安全
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-08 DOI: 10.1049/cps2.12089
Biagio Boi, Christian Esposito

The Internet of Things (IoT) is revolutionizing the healthcare industry by enhancing personalized patient care. However, the transmission of sensitive health data in IoT systems presents significant security and privacy challenges, further exacerbated by the difficulty of exploiting traditional protection means due to poor battery equipment and limited storage and computational capabilities of IoT devices. The authors analyze techniques applied in the medical context to encrypt sensible data and deal with the unique challenges of resource-constrained devices. A technique that is facing increasing interest is the Physical Unclonable Function (PUF), where biometrics are implemented on integrated circuits' electric features. PUFs, however, demand special hardware, so in this work, instead of considering the physical device as a source of randomness, an ElectroCardioGram (ECG) can be taken into consideration to make a ‘virtual’ PUF. Such an mechanism leverages individual ECG signals to generate a cryptographic key for encrypting and decrypting data. Due to the poor stability of the ECG signal and the typical noise existing in the measurement process for such a signal, filtering and feature extraction techniques must be adopted. The proposed model considers the adoption of pre-processing techniques in conjunction with a fuzzy extractor to add stability to the signal. Experiments were performed on a dataset containing ECG records gathered over 6 months, yielding good results in the short term and valuable outcomes in the long term, paving the way for adaptive PUF techniques in this context.

物联网(IoT)通过加强对患者的个性化护理,正在彻底改变医疗保健行业。然而,在物联网系统中传输敏感健康数据带来了巨大的安全和隐私挑战,由于物联网设备的电池设备差、存储和计算能力有限,难以利用传统的保护手段,从而进一步加剧了这一挑战。作者分析了应用于医疗领域的技术,以加密敏感数据并应对资源受限设备的独特挑战。物理不可克隆函数(PUF)是一种越来越受关注的技术,生物识别技术是在集成电路的电气特性上实现的。然而,PUF 需要特殊的硬件,因此在这项工作中,我们不再将物理设备作为随机性的来源,而是将心电图(ECG)作为 "虚拟 "PUF 的考虑因素。这种机制利用单个心电信号生成加密密钥,用于加密和解密数据。由于心电信号的稳定性较差,而且在测量过程中存在典型的噪声,因此必须采用滤波和特征提取技术。建议的模型考虑采用预处理技术和模糊提取器,以增加信号的稳定性。实验是在一个包含 6 个月心电图记录的数据集上进行的,在短期内取得了良好的结果,并在长期内取得了有价值的成果,为自适应 PUF 技术在这种情况下的应用铺平了道路。
{"title":"Securing the Internet of Medical Things with ECG-based PUF encryption","authors":"Biagio Boi,&nbsp;Christian Esposito","doi":"10.1049/cps2.12089","DOIUrl":"10.1049/cps2.12089","url":null,"abstract":"<p>The Internet of Things (IoT) is revolutionizing the healthcare industry by enhancing personalized patient care. However, the transmission of sensitive health data in IoT systems presents significant security and privacy challenges, further exacerbated by the difficulty of exploiting traditional protection means due to poor battery equipment and limited storage and computational capabilities of IoT devices. The authors analyze techniques applied in the medical context to encrypt sensible data and deal with the unique challenges of resource-constrained devices. A technique that is facing increasing interest is the Physical Unclonable Function (PUF), where biometrics are implemented on integrated circuits' electric features. PUFs, however, demand special hardware, so in this work, instead of considering the physical device as a source of randomness, an ElectroCardioGram (ECG) can be taken into consideration to make a ‘virtual’ PUF. Such an mechanism leverages individual ECG signals to generate a cryptographic key for encrypting and decrypting data. Due to the poor stability of the ECG signal and the typical noise existing in the measurement process for such a signal, filtering and feature extraction techniques must be adopted. The proposed model considers the adoption of pre-processing techniques in conjunction with a fuzzy extractor to add stability to the signal. Experiments were performed on a dataset containing ECG records gathered over 6 months, yielding good results in the short term and valuable outcomes in the long term, paving the way for adaptive PUF techniques in this context.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 2","pages":"115-124"},"PeriodicalIF":0.8,"publicationDate":"2024-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140257509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Petri net model for Time-Delay Attack detection in Precision Time Protocol-based networks 基于精确时间协议网络的时延攻击检测 Petri 网模型
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-27 DOI: 10.1049/cps2.12088
Mohsen Moradi, Amir Hossein Jahangir

Along with the development of industrial and distributed systems, security concerns have also emerged in industrial communication protocols. PTP, Precision Time Protocol, is one of the most precise time synchronisation protocols for industrial devices. It ensures real-time activity of the industrial control systems with precision equal to microseconds. In order to address the actual or potential security issues of PTP, this article firstly describes attack models applicable to PTP and then focuses on applying Coloured Petri Net to formally analyse the attack detection methods and also model PTP. The alignment of simulation results with the model and the considered assumptions show the suitability and accuracy of the proposed model.

随着工业和分布式系统的发展,工业通信协议也出现了安全问题。PTP(精确时间协议)是工业设备最精确的时间同步协议之一。它确保工业控制系统的实时活动精确到微秒级。为了解决 PTP 实际或潜在的安全问题,本文首先介绍了适用于 PTP 的攻击模型,然后重点应用彩色 Petri 网正式分析攻击检测方法,并对 PTP 进行建模。仿真结果与模型和所考虑的假设的一致性表明了所提出模型的适用性和准确性。
{"title":"A Petri net model for Time-Delay Attack detection in Precision Time Protocol-based networks","authors":"Mohsen Moradi,&nbsp;Amir Hossein Jahangir","doi":"10.1049/cps2.12088","DOIUrl":"10.1049/cps2.12088","url":null,"abstract":"<p>Along with the development of industrial and distributed systems, security concerns have also emerged in industrial communication protocols. PTP, Precision Time Protocol, is one of the most precise time synchronisation protocols for industrial devices. It ensures real-time activity of the industrial control systems with precision equal to microseconds. In order to address the actual or potential security issues of PTP, this article firstly describes attack models applicable to PTP and then focuses on applying Coloured Petri Net to formally analyse the attack detection methods and also model PTP. The alignment of simulation results with the model and the considered assumptions show the suitability and accuracy of the proposed model.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"407-423"},"PeriodicalIF":0.8,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12088","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140426605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging graph clustering techniques for cyber-physical system analysis to enhance disturbance characterisation 利用图聚类技术进行网络物理系统分析,加强干扰特征描述
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-17 DOI: 10.1049/cps2.12087
Nicholas Jacobs, Shamina Hossain-McKenzie, Shining Sun, Emily Payne, Adam Summers, Leen Al-Homoud, Astrid Layton, Kate Davis, Chris Goes

Cyber-physical systems have behaviour that crosses domain boundaries during events such as planned operational changes and malicious disturbances. Traditionally, the cyber and physical systems are monitored separately and use very different toolsets and analysis paradigms. The security and privacy of these cyber-physical systems requires improved understanding of the combined cyber-physical system behaviour and methods for holistic analysis. Therefore, the authors propose leveraging clustering techniques on cyber-physical data from smart grid systems to analyse differences and similarities in behaviour during cyber-, physical-, and cyber-physical disturbances. Since clustering methods are commonly used in data science to examine statistical similarities in order to sort large datasets, these algorithms can assist in identifying useful relationships in cyber-physical systems. Through this analysis, deeper insights can be shared with decision-makers on what cyber and physical components are strongly or weakly linked, what cyber-physical pathways are most traversed, and the criticality of certain cyber-physical nodes or edges. This paper presents several types of clustering methods for cyber-physical graphs of smart grid systems and their application in assessing different types of disturbances for informing cyber-physical situational awareness. The collection of these clustering techniques provide a foundational basis for cyber-physical graph interdependency analysis.

网络物理系统在发生计划的操作变更和恶意干扰等事件时,其行为会跨越领域边界。传统上,网络系统和物理系统是分开监控的,使用的工具集和分析范式也大相径庭。要确保这些网络物理系统的安全性和隐私性,就必须更好地了解网络物理系统的综合行为和整体分析方法。因此,作者建议利用智能电网系统网络物理数据的聚类技术,分析网络、物理和网络物理干扰期间行为的异同。由于聚类方法通常用于数据科学,以检查统计相似性,从而对大型数据集进行分类,因此这些算法可帮助识别网络物理系统中的有用关系。通过这种分析,决策者可以更深入地了解哪些网络和物理组件之间的联系较强或较弱,哪些网络物理路径最易被穿越,以及某些网络物理节点或边缘的关键性。本文介绍了智能电网系统网络物理图的几种聚类方法,以及它们在评估不同类型干扰以提供网络物理态势感知方面的应用。这些聚类技术为网络物理图相互依存分析提供了基础。
{"title":"Leveraging graph clustering techniques for cyber-physical system analysis to enhance disturbance characterisation","authors":"Nicholas Jacobs,&nbsp;Shamina Hossain-McKenzie,&nbsp;Shining Sun,&nbsp;Emily Payne,&nbsp;Adam Summers,&nbsp;Leen Al-Homoud,&nbsp;Astrid Layton,&nbsp;Kate Davis,&nbsp;Chris Goes","doi":"10.1049/cps2.12087","DOIUrl":"10.1049/cps2.12087","url":null,"abstract":"<p>Cyber-physical systems have behaviour that crosses domain boundaries during events such as planned operational changes and malicious disturbances. Traditionally, the cyber and physical systems are monitored separately and use very different toolsets and analysis paradigms. The security and privacy of these cyber-physical systems requires improved understanding of the combined cyber-physical system behaviour and methods for holistic analysis. Therefore, the authors propose leveraging clustering techniques on cyber-physical data from smart grid systems to analyse differences and similarities in behaviour during cyber-, physical-, and cyber-physical disturbances. Since clustering methods are commonly used in data science to examine statistical similarities in order to sort large datasets, these algorithms can assist in identifying useful relationships in cyber-physical systems. Through this analysis, deeper insights can be shared with decision-makers on what cyber and physical components are strongly or weakly linked, what cyber-physical pathways are most traversed, and the criticality of certain cyber-physical nodes or edges. This paper presents several types of clustering methods for cyber-physical graphs of smart grid systems and their application in assessing different types of disturbances for informing cyber-physical situational awareness. The collection of these clustering techniques provide a foundational basis for cyber-physical graph interdependency analysis.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 4","pages":"392-406"},"PeriodicalIF":0.8,"publicationDate":"2024-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12087","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139960393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Status, challenges, and promises of data-driven battery lifetime prediction under cyber-physical system context 网络物理系统背景下数据驱动电池寿命预测的现状、挑战和前景
IF 0.8 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-31 DOI: 10.1049/cps2.12086
Yang Liu, Sihui Chen, Peiyi Li, Jiayu Wan, Xin Li

Energy storage is playing an increasingly important role in the modern world as sustainability is becoming a critical issue. Within this domain, rechargeable battery is gaining significant popularity as it has been adopted to serve as the power supplier in a broad range of application scenarios, such as cyber-physical system (CPS), due to multiple advantages. On the other hand, battery inspection and management solutions have been constructed based on the CPS architecture in order to guarantee the quality, reliability and safety of rechargeable batteries. In specific, lifetime prediction is extensively studied in recent research as it can help assess the quality and health status to facilitate the manufacturing and maintenance. Due to the aforementioned importance, the authors aim to conduct a comprehensive survey on the data-driven techniques for battery lifetime prediction, including their current status, challenges and promises. In contrast to existing literature, the battery lifetime prediction methods are studied under CPS context in this survey. Hence, the authors focus on the algorithms for lifetime prediction as well as the engineering frameworks that enable the data acquisition and deployment of prediction models in CPS systems. Through this survey, the authors intend to investigate both academic and practical values in the domain of battery lifetime prediction to benefit both researchers and practitioners.

随着可持续发展成为一个关键问题,能源存储在现代社会中发挥着越来越重要的作用。在这一领域,可充电电池因其多种优势,在网络物理系统(CPS)等广泛的应用场景中被用作电源供应器,因而大受欢迎。另一方面,为了保证充电电池的质量、可靠性和安全性,人们基于 CPS 架构构建了电池检测和管理解决方案。具体而言,寿命预测有助于评估电池的质量和健康状况,从而促进电池的生产和维护,因此在最近的研究中得到了广泛的研究。鉴于上述重要性,作者旨在对电池寿命预测的数据驱动技术进行全面调查,包括其现状、挑战和前景。与现有文献不同的是,本调查是在 CPS 背景下研究电池寿命预测方法。因此,作者重点研究了电池寿命预测算法,以及在 CPS 系统中获取数据和部署预测模型的工程框架。通过本次调查,作者希望调查电池寿命预测领域的学术价值和实用价值,使研究人员和从业人员都能从中受益。
{"title":"Status, challenges, and promises of data-driven battery lifetime prediction under cyber-physical system context","authors":"Yang Liu,&nbsp;Sihui Chen,&nbsp;Peiyi Li,&nbsp;Jiayu Wan,&nbsp;Xin Li","doi":"10.1049/cps2.12086","DOIUrl":"10.1049/cps2.12086","url":null,"abstract":"<p>Energy storage is playing an increasingly important role in the modern world as sustainability is becoming a critical issue. Within this domain, rechargeable battery is gaining significant popularity as it has been adopted to serve as the power supplier in a broad range of application scenarios, such as cyber-physical system (CPS), due to multiple advantages. On the other hand, battery inspection and management solutions have been constructed based on the CPS architecture in order to guarantee the quality, reliability and safety of rechargeable batteries. In specific, lifetime prediction is extensively studied in recent research as it can help assess the quality and health status to facilitate the manufacturing and maintenance. Due to the aforementioned importance, the authors aim to conduct a comprehensive survey on the data-driven techniques for battery lifetime prediction, including their current status, challenges and promises. In contrast to existing literature, the battery lifetime prediction methods are studied under CPS context in this survey. Hence, the authors focus on the algorithms for lifetime prediction as well as the engineering frameworks that enable the data acquisition and deployment of prediction models in CPS systems. Through this survey, the authors intend to investigate both academic and practical values in the domain of battery lifetime prediction to benefit both researchers and practitioners.</p>","PeriodicalId":36881,"journal":{"name":"IET Cyber-Physical Systems: Theory and Applications","volume":"9 3","pages":"207-217"},"PeriodicalIF":0.8,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cps2.12086","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140471755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Cyber-Physical Systems: Theory and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1