首页 > 最新文献

Future Internet最新文献

英文 中文
Internet-of-Things Traffic Analysis and Device Identification Based on Two-Stage Clustering in Smart Home Environments 基于智能家居环境中两阶段聚类的物联网流量分析和设备识别
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-31 DOI: 10.3390/fi16010017
Mizuki Asano, Takumi Miyoshi, Taku Yamazaki
Smart home environments, which consist of various Internet of Things (IoT) devices to support and improve our daily lives, are expected to be widely adopted in the near future. Owing to a lack of awareness regarding the risks associated with IoT devices and challenges in replacing or the updating their firmware, adequate security measures have not been implemented. Instead, IoT device identification methods based on traffic analysis have been proposed. Since conventional methods process and analyze traffic data simultaneously, bias in the occurrence rate of traffic patterns has a negative impact on the analysis results. Therefore, this paper proposes an IoT traffic analysis and device identification method based on two-stage clustering in smart home environments. In the first step, traffic patterns are extracted by clustering IoT traffic at a local gateway located in each smart home and subsequently sent to a cloud server. In the second step, the cloud server extracts common traffic units to represent IoT traffic by clustering the patterns obtained in the first step. Two-stage clustering can reduce the impact of data bias, because each cluster extracted in the first clustering is summarized as one value and used as a single data point in the second clustering, regardless of the occurrence rate of traffic patterns. Through the proposed two-stage clustering method, IoT traffic is transformed into time series vector data that consist of common unit patterns and can be identified based on time series representations. Experiments using public IoT traffic datasets indicated that the proposed method could identify 21 IoTs devices with an accuracy of 86.9%. Therefore, we can conclude that traffic analysis using two-stage clustering is effective for improving the clustering quality, device identification, and implementation in distributed environments.
智能家居环境由各种物联网(IoT)设备组成,用于支持和改善我们的日常生活,预计在不久的将来将被广泛采用。由于缺乏对物联网设备相关风险的认识,以及在更换或更新固件方面的挑战,尚未实施适当的安全措施。相反,人们提出了基于流量分析的物联网设备识别方法。由于传统方法同时处理和分析流量数据,流量模式出现率的偏差会对分析结果产生负面影响。因此,本文提出了一种基于两阶段聚类的智能家居环境下物联网流量分析和设备识别方法。第一步,在每个智能家居的本地网关对物联网流量进行聚类,提取流量模式,然后发送到云服务器。第二步,云服务器通过对第一步获得的模式进行聚类,提取出代表物联网流量的通用流量单元。两阶段聚类可以减少数据偏差的影响,因为无论流量模式的出现率如何,第一次聚类中提取的每个聚类都会汇总为一个值,并在第二次聚类中作为单个数据点使用。通过所提出的两阶段聚类方法,物联网流量被转化为由共同单元模式组成的时间序列矢量数据,并可根据时间序列表示进行识别。使用公共物联网流量数据集进行的实验表明,所提出的方法可以识别出 21 个物联网设备,准确率高达 86.9%。因此,我们可以得出结论,使用两阶段聚类进行流量分析对于提高聚类质量、设备识别以及在分布式环境中的实施都是有效的。
{"title":"Internet-of-Things Traffic Analysis and Device Identification Based on Two-Stage Clustering in Smart Home Environments","authors":"Mizuki Asano, Takumi Miyoshi, Taku Yamazaki","doi":"10.3390/fi16010017","DOIUrl":"https://doi.org/10.3390/fi16010017","url":null,"abstract":"Smart home environments, which consist of various Internet of Things (IoT) devices to support and improve our daily lives, are expected to be widely adopted in the near future. Owing to a lack of awareness regarding the risks associated with IoT devices and challenges in replacing or the updating their firmware, adequate security measures have not been implemented. Instead, IoT device identification methods based on traffic analysis have been proposed. Since conventional methods process and analyze traffic data simultaneously, bias in the occurrence rate of traffic patterns has a negative impact on the analysis results. Therefore, this paper proposes an IoT traffic analysis and device identification method based on two-stage clustering in smart home environments. In the first step, traffic patterns are extracted by clustering IoT traffic at a local gateway located in each smart home and subsequently sent to a cloud server. In the second step, the cloud server extracts common traffic units to represent IoT traffic by clustering the patterns obtained in the first step. Two-stage clustering can reduce the impact of data bias, because each cluster extracted in the first clustering is summarized as one value and used as a single data point in the second clustering, regardless of the occurrence rate of traffic patterns. Through the proposed two-stage clustering method, IoT traffic is transformed into time series vector data that consist of common unit patterns and can be identified based on time series representations. Experiments using public IoT traffic datasets indicated that the proposed method could identify 21 IoTs devices with an accuracy of 86.9%. Therefore, we can conclude that traffic analysis using two-stage clustering is effective for improving the clustering quality, device identification, and implementation in distributed environments.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"74 24","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139130305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Controllable Queuing System with Elastic Traffic and Signals for Resource Capacity Planning in 5G Network Slicing 用于 5G 网络切片中资源容量规划的具有弹性流量和信号的可控排队系统
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-31 DOI: 10.3390/fi16010018
Irina Kochetkova, Kseniia Leonteva, Ibram Ghebrial, Anastasiya S. Vlaskina, S. Burtseva, Anna Kushchazli, Konstantin Samouylov
Fifth-generation (5G) networks provide network slicing capabilities, enabling the deployment of multiple logically isolated network slices on a single infrastructure platform to meet specific requirements of users. This paper focuses on modeling and analyzing resource capacity planning and reallocation for network slicing, specifically between two providers transmitting elastic traffic, such during as web browsing. A controller determines the need for resource reallocation and plans new resource capacity accordingly. A Markov decision process is employed in a controllable queuing system to find the optimal resource capacity for each provider. The reward function incorporates three network slicing principles: maximum matching for equal resource partitioning, maximum share of signals resulting in resource reallocation, and maximum resource utilization. To efficiently compute the optimal resource capacity planning policy, we developed an iterative algorithm that begins with maximum resource utilization as the starting point. Through numerical demonstrations, we show the optimal policy and metrics of resource reallocation for two services: web browsing and bulk data transfer. The results highlight fast convergence within three iterations and the effectiveness of the balanced three-principle approach in resource capacity planning for 5G network slicing.
第五代(5G)网络具有网络切片功能,可在单个基础设施平台上部署多个逻辑隔离的网络切片,以满足用户的特定需求。本文重点对网络切片的资源容量规划和重新分配进行建模和分析,特别是在两个传输弹性流量(如网页浏览)的提供商之间。控制器确定资源重新分配的需求,并相应规划新的资源容量。在可控排队系统中采用马尔可夫决策过程,为每个提供商找到最佳资源容量。奖励函数包含三个网络切分原则:平等资源分配的最大匹配、导致资源重新分配的最大信号份额和最大资源利用率。为了有效计算最佳资源容量规划策略,我们开发了一种以最大资源利用率为起点的迭代算法。通过数值演示,我们展示了网页浏览和批量数据传输这两种服务的最优策略和资源重新分配指标。结果凸显了三次迭代内的快速收敛性,以及平衡三原则方法在 5G 网络切片资源容量规划中的有效性。
{"title":"Controllable Queuing System with Elastic Traffic and Signals for Resource Capacity Planning in 5G Network Slicing","authors":"Irina Kochetkova, Kseniia Leonteva, Ibram Ghebrial, Anastasiya S. Vlaskina, S. Burtseva, Anna Kushchazli, Konstantin Samouylov","doi":"10.3390/fi16010018","DOIUrl":"https://doi.org/10.3390/fi16010018","url":null,"abstract":"Fifth-generation (5G) networks provide network slicing capabilities, enabling the deployment of multiple logically isolated network slices on a single infrastructure platform to meet specific requirements of users. This paper focuses on modeling and analyzing resource capacity planning and reallocation for network slicing, specifically between two providers transmitting elastic traffic, such during as web browsing. A controller determines the need for resource reallocation and plans new resource capacity accordingly. A Markov decision process is employed in a controllable queuing system to find the optimal resource capacity for each provider. The reward function incorporates three network slicing principles: maximum matching for equal resource partitioning, maximum share of signals resulting in resource reallocation, and maximum resource utilization. To efficiently compute the optimal resource capacity planning policy, we developed an iterative algorithm that begins with maximum resource utilization as the starting point. Through numerical demonstrations, we show the optimal policy and metrics of resource reallocation for two services: web browsing and bulk data transfer. The results highlight fast convergence within three iterations and the effectiveness of the balanced three-principle approach in resource capacity planning for 5G network slicing.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"76 7","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139130260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource Indexing and Querying in Large Connected Environments 大型互联环境中的资源索引和查询
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-30 DOI: 10.3390/fi16010015
Fouad Achkouty, Richard Chbeir, Laurent Gallon, Elio Mansour, Antonio Corral
The proliferation of sensor and actuator devices in Internet of things (IoT) networks has garnered significant attention in recent years. However, the increasing number of IoT devices, and the corresponding resources, has introduced various challenges, particularly in indexing and querying. In essence, resource management has become more complex due to the non-uniform distribution of related devices and their limited capacity. Additionally, the diverse demands of users have further complicated resource indexing. This paper proposes a distributed resource indexing and querying algorithm for large connected environments, specifically designed to address the challenges posed by IoT networks. The algorithm considers both the limited device capacity and the non-uniform distribution of devices, acknowledging that devices cannot store information about the entire environment. Furthermore, it places special emphasis on uncovered zones, to reduce the response time of queries related to these areas. Moreover, the algorithm introduces different types of queries, to cater to various user needs, including fast queries and urgent queries suitable for different scenarios. The effectiveness of the proposed approach was evaluated through extensive experiments covering index creation, coverage, and query execution, yielding promising and insightful results.
近年来,物联网(IoT)网络中传感器和执行器设备的激增引起了广泛关注。然而,物联网设备和相应资源的不断增加带来了各种挑战,特别是在索引和查询方面。从本质上讲,由于相关设备分布不均匀且容量有限,资源管理变得更加复杂。此外,用户的不同需求也使资源索引变得更加复杂。本文提出了一种适用于大型联网环境的分布式资源索引和查询算法,专门用于应对物联网网络带来的挑战。该算法既考虑了设备容量的有限性,又考虑了设备分布的不均匀性,承认设备无法存储整个环境的信息。此外,该算法还特别重视未覆盖区域,以减少与这些区域相关的查询的响应时间。此外,该算法还引入了不同类型的查询,以满足用户的各种需求,包括适合不同场景的快速查询和紧急查询。通过涵盖索引创建、覆盖范围和查询执行等方面的大量实验,对所提方法的有效性进行了评估,得出了令人鼓舞和富有洞察力的结果。
{"title":"Resource Indexing and Querying in Large Connected Environments","authors":"Fouad Achkouty, Richard Chbeir, Laurent Gallon, Elio Mansour, Antonio Corral","doi":"10.3390/fi16010015","DOIUrl":"https://doi.org/10.3390/fi16010015","url":null,"abstract":"The proliferation of sensor and actuator devices in Internet of things (IoT) networks has garnered significant attention in recent years. However, the increasing number of IoT devices, and the corresponding resources, has introduced various challenges, particularly in indexing and querying. In essence, resource management has become more complex due to the non-uniform distribution of related devices and their limited capacity. Additionally, the diverse demands of users have further complicated resource indexing. This paper proposes a distributed resource indexing and querying algorithm for large connected environments, specifically designed to address the challenges posed by IoT networks. The algorithm considers both the limited device capacity and the non-uniform distribution of devices, acknowledging that devices cannot store information about the entire environment. Furthermore, it places special emphasis on uncovered zones, to reduce the response time of queries related to these areas. Moreover, the algorithm introduces different types of queries, to cater to various user needs, including fast queries and urgent queries suitable for different scenarios. The effectiveness of the proposed approach was evaluated through extensive experiments covering index creation, coverage, and query execution, yielding promising and insightful results.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":" 30","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139141380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of Methods and Metrics for Task Scheduling in Fog Computing 雾计算任务调度方法和指标分析
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-30 DOI: 10.3390/fi16010016
Javid Misirli, E. Casalicchio
The Internet of Things (IoT) uptake brought a paradigm shift in application deployment. Indeed, IoT applications are not centralized in cloud data centers, but the computation and storage are moved close to the consumers, creating a computing continuum between the edge of the network and the cloud. This paradigm shift is called fog computing, a concept introduced by Cisco in 2012. Scheduling applications in this decentralized, heterogeneous, and resource-constrained environment is challenging. The task scheduling problem in fog computing has been widely explored and addressed using many approaches, from traditional operational research to heuristics and machine learning. This paper aims to analyze the literature on task scheduling in fog computing published in the last five years to classify the criteria used for decision-making and the technique used to solve the task scheduling problem. We propose a taxonomy of task scheduling algorithms, and we identify the research gaps and challenges.
物联网(IoT)的普及带来了应用部署模式的转变。事实上,物联网应用并不是集中在云数据中心,而是将计算和存储转移到靠近消费者的地方,在网络边缘和云之间形成了一个计算连续体。这种模式转变被称为雾计算,是思科公司在 2012 年提出的概念。在这种分散、异构和资源受限的环境中调度应用具有挑战性。从传统的运筹学到启发式方法和机器学习,人们已经用多种方法广泛探讨和解决了雾计算中的任务调度问题。本文旨在分析过去五年中发表的有关雾计算任务调度的文献,对用于决策的标准和用于解决任务调度问题的技术进行分类。我们提出了任务调度算法分类法,并指出了研究空白和挑战。
{"title":"An Analysis of Methods and Metrics for Task Scheduling in Fog Computing","authors":"Javid Misirli, E. Casalicchio","doi":"10.3390/fi16010016","DOIUrl":"https://doi.org/10.3390/fi16010016","url":null,"abstract":"The Internet of Things (IoT) uptake brought a paradigm shift in application deployment. Indeed, IoT applications are not centralized in cloud data centers, but the computation and storage are moved close to the consumers, creating a computing continuum between the edge of the network and the cloud. This paradigm shift is called fog computing, a concept introduced by Cisco in 2012. Scheduling applications in this decentralized, heterogeneous, and resource-constrained environment is challenging. The task scheduling problem in fog computing has been widely explored and addressed using many approaches, from traditional operational research to heuristics and machine learning. This paper aims to analyze the literature on task scheduling in fog computing published in the last five years to classify the criteria used for decision-making and the technique used to solve the task scheduling problem. We propose a taxonomy of task scheduling algorithms, and we identify the research gaps and challenges.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":" 46","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139141967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
1-D Convolutional Neural Network-Based Models for Cooperative Spectrum Sensing 基于一维卷积神经网络的合作频谱传感模型
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-29 DOI: 10.3390/fi16010014
Omar Serghini, H. Semlali, A. Maali, A. Ghammaz, Salvatore Serrano
Spectrum sensing is an essential function of cognitive radio technology that can enable the reuse of available radio resources by so-called secondary users without creating harmful interference with licensed users. The application of machine learning techniques to spectrum sensing has attracted considerable interest in the literature. In this contribution, we study cooperative spectrum sensing in a cognitive radio network where multiple secondary users cooperate to detect a primary user. We introduce multiple cooperative spectrum sensing schemes based on a deep neural network, which incorporate a one-dimensional convolutional neural network and a long short-term memory network. The primary objective of these schemes is to effectively learn the activity patterns of the primary user. The scenario of an imperfect transmission channel is considered for service messages to demonstrate the robustness of the proposed model. The performance of the proposed methods is evaluated with the receiver operating characteristic curve, the probability of detection for various SNR levels and the computational time. The simulation results confirm the effectiveness of the bidirectional long short-term memory-based method, surpassing the performance of the other proposed schemes and the current state-of-the-art methods in terms of detection probability, while ensuring a reasonable online detection time.
频谱感知是认知无线电技术的一项基本功能,可使所谓的次级用户重复使用可用无线电资源,而不会对许可用户造成有害干扰。机器学习技术在频谱感知中的应用在文献中引起了广泛关注。在本文中,我们研究了认知无线电网络中的合作频谱感知,在该网络中,多个次级用户合作检测一个主用户。我们介绍了多种基于深度神经网络的合作频谱感知方案,其中包括一维卷积神经网络和长短期记忆网络。这些方案的主要目标是有效学习主用户的活动模式。为了证明所提模型的鲁棒性,我们考虑了服务信息传输信道不完善的情况。通过接收器工作特性曲线、不同信噪比水平下的检测概率和计算时间来评估所提出方法的性能。仿真结果证实了基于双向长短时记忆的方法的有效性,在检测概率方面超过了其他建议方案和当前最先进方法的性能,同时确保了合理的在线检测时间。
{"title":"1-D Convolutional Neural Network-Based Models for Cooperative Spectrum Sensing","authors":"Omar Serghini, H. Semlali, A. Maali, A. Ghammaz, Salvatore Serrano","doi":"10.3390/fi16010014","DOIUrl":"https://doi.org/10.3390/fi16010014","url":null,"abstract":"Spectrum sensing is an essential function of cognitive radio technology that can enable the reuse of available radio resources by so-called secondary users without creating harmful interference with licensed users. The application of machine learning techniques to spectrum sensing has attracted considerable interest in the literature. In this contribution, we study cooperative spectrum sensing in a cognitive radio network where multiple secondary users cooperate to detect a primary user. We introduce multiple cooperative spectrum sensing schemes based on a deep neural network, which incorporate a one-dimensional convolutional neural network and a long short-term memory network. The primary objective of these schemes is to effectively learn the activity patterns of the primary user. The scenario of an imperfect transmission channel is considered for service messages to demonstrate the robustness of the proposed model. The performance of the proposed methods is evaluated with the receiver operating characteristic curve, the probability of detection for various SNR levels and the computational time. The simulation results confirm the effectiveness of the bidirectional long short-term memory-based method, surpassing the performance of the other proposed schemes and the current state-of-the-art methods in terms of detection probability, while ensuring a reasonable online detection time.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":" 8","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139143123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating Embeddings from Pre-Trained Language Models and Knowledge Graphs for Educational Content Recommendation 评估用于教育内容推荐的预训练语言模型和知识图谱嵌入情况
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-29 DOI: 10.3390/fi16010012
Xiu Li, Aron Henriksson, Martin Duneld, Jalal Nouri, Yongchao Wu
Educational content recommendation is a cornerstone of AI-enhanced learning. In particular, to facilitate navigating the diverse learning resources available on learning platforms, methods are needed for automatically linking learning materials, e.g., in order to recommend textbook content based on exercises. Such methods are typically based on semantic textual similarity (STS) and the use of embeddings for text representation. However, it remains unclear what types of embeddings should be used for this task. In this study, we carry out an extensive empirical evaluation of embeddings derived from three different types of models: (i) static embeddings trained using a concept-based knowledge graph, (ii) contextual embeddings from a pre-trained language model, and (iii) contextual embeddings from a large language model (LLM). In addition to evaluating the models individually, various ensembles are explored based on different strategies for combining two models in an early vs. late fusion fashion. The evaluation is carried out using digital textbooks in Swedish for three different subjects and two types of exercises. The results show that using contextual embeddings from an LLM leads to superior performance compared to the other models, and that there is no significant improvement when combining these with static embeddings trained using a knowledge graph. When using embeddings derived from a smaller language model, however, it helps to combine them with knowledge graph embeddings. The performance of the best-performing model is high for both types of exercises, resulting in a mean Recall@3 of 0.96 and 0.95 and a mean MRR of 0.87 and 0.86 for quizzes and study questions, respectively, demonstrating the feasibility of using STS based on text embeddings for educational content recommendation. The ability to link digital learning materials in an unsupervised manner—relying only on readily available pre-trained models—facilitates the development of AI-enhanced learning.
教育内容推荐是人工智能强化学习的基石。特别是,为了方便浏览学习平台上的各种学习资源,需要有自动链接学习材料的方法,例如,根据练习推荐教科书内容。这类方法通常基于语义文本相似性(STS)和使用嵌入式文本表示法。但是,目前还不清楚应该使用哪种类型的嵌入式来完成这项任务。在本研究中,我们对来自三种不同类型模型的嵌入进行了广泛的实证评估:(i) 使用基于概念的知识图谱训练的静态嵌入;(ii) 来自预训练语言模型的上下文嵌入;(iii) 来自大型语言模型(LLM)的上下文嵌入。除了对模型进行单独评估外,还根据以早期与晚期融合方式结合两种模型的不同策略,探索了各种组合。评估使用了瑞典语数字教科书中的三个不同科目和两种类型的练习。结果表明,与其他模型相比,使用来自 LLM 的上下文嵌入会带来更优越的性能,而将其与使用知识图谱训练的静态嵌入相结合则没有明显改善。然而,当使用从较小的语言模型中提取的嵌入词时,将它们与知识图谱嵌入词结合起来会有所帮助。在两种类型的练习中,表现最好的模型的性能都很高,测验和学习问题的平均 Recall@3 分别为 0.96 和 0.95,平均 MRR 分别为 0.87 和 0.86,这证明了使用基于文本嵌入的 STS 进行教育内容推荐的可行性。以无监督方式链接数字学习材料的能力--仅依赖于现成的预训练模型--促进了人工智能增强学习的发展。
{"title":"Evaluating Embeddings from Pre-Trained Language Models and Knowledge Graphs for Educational Content Recommendation","authors":"Xiu Li, Aron Henriksson, Martin Duneld, Jalal Nouri, Yongchao Wu","doi":"10.3390/fi16010012","DOIUrl":"https://doi.org/10.3390/fi16010012","url":null,"abstract":"Educational content recommendation is a cornerstone of AI-enhanced learning. In particular, to facilitate navigating the diverse learning resources available on learning platforms, methods are needed for automatically linking learning materials, e.g., in order to recommend textbook content based on exercises. Such methods are typically based on semantic textual similarity (STS) and the use of embeddings for text representation. However, it remains unclear what types of embeddings should be used for this task. In this study, we carry out an extensive empirical evaluation of embeddings derived from three different types of models: (i) static embeddings trained using a concept-based knowledge graph, (ii) contextual embeddings from a pre-trained language model, and (iii) contextual embeddings from a large language model (LLM). In addition to evaluating the models individually, various ensembles are explored based on different strategies for combining two models in an early vs. late fusion fashion. The evaluation is carried out using digital textbooks in Swedish for three different subjects and two types of exercises. The results show that using contextual embeddings from an LLM leads to superior performance compared to the other models, and that there is no significant improvement when combining these with static embeddings trained using a knowledge graph. When using embeddings derived from a smaller language model, however, it helps to combine them with knowledge graph embeddings. The performance of the best-performing model is high for both types of exercises, resulting in a mean Recall@3 of 0.96 and 0.95 and a mean MRR of 0.87 and 0.86 for quizzes and study questions, respectively, demonstrating the feasibility of using STS based on text embeddings for educational content recommendation. The ability to link digital learning materials in an unsupervised manner—relying only on readily available pre-trained models—facilitates the development of AI-enhanced learning.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":" 4","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139142347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automotive Cybersecurity Application Based on CARDIAN 基于 CARDIAN 的汽车网络安全应用程序
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-28 DOI: 10.3390/fi16010010
Emanuele Santonicola, Ennio Andrea Adinolfi, Simone Coppola, Francesco Pascale
Nowadays, a vehicle can contain from 20 to 100 ECUs, which are responsible for ordering, controlling and monitoring all the components of the vehicle itself. Each of these units can also send and receive information to other units on the network or externally. For most vehicles, the controller area network (CAN) is the main communication protocol and system used to build their internal network. Technological development, the growing integration of devices and the numerous advances in the field of connectivity have allowed the vehicle to become connected, and the flow of information exchanged between the various ECUs (electronic control units) becomes increasingly important and varied. Furthermore, the vehicle itself is capable of exchanging information with other vehicles, with the surrounding environment and with the Internet. As shown by the CARDIAN project, this type of innovation allows the user an increasingly safe and varied driving experience, but at the same time, it introduces a series of vulnerabilities and dangers due to the connection itself. The job of making the vehicle safe therefore becomes critical. In recent years, it has been demonstrated in multiple ways how easy it is to compromise the safety of a vehicle and its passengers by injecting malicious messages into the CAN network present inside the vehicle itself. The purpose of this article is the construction of a system that, integrated within the vehicle network, is able to effectively recognize any type of intrusion and tampering.
如今,一辆汽车可以包含 20 到 100 个 ECU,它们负责订购、控制和监控汽车本身的所有部件。每个单元还可以向网络上或外部的其他单元发送和接收信息。对于大多数车辆来说,控制器区域网络(CAN)是用于构建内部网络的主要通信协议和系统。技术的发展、设备集成度的不断提高以及互联领域的诸多进步,使得车辆实现了互联,各种 ECU(电子控制单元)之间的信息交换流变得越来越重要和多样化。此外,车辆本身也能与其他车辆、周围环境和互联网交换信息。正如 CARDIAN 项目所显示的那样,这种创新为用户带来了越来越安全和多样化的驾驶体验,但同时也由于连接本身而带来了一系列的漏洞和危险。因此,确保车辆安全的工作变得至关重要。近年来,已经有多种方法证明,通过向车辆内部的 CAN 网络注入恶意信息,可以轻而易举地危及车辆及其乘客的安全。本文的目的是构建一个集成在车辆网络中的系统,该系统能够有效识别任何类型的入侵和篡改。
{"title":"Automotive Cybersecurity Application Based on CARDIAN","authors":"Emanuele Santonicola, Ennio Andrea Adinolfi, Simone Coppola, Francesco Pascale","doi":"10.3390/fi16010010","DOIUrl":"https://doi.org/10.3390/fi16010010","url":null,"abstract":"Nowadays, a vehicle can contain from 20 to 100 ECUs, which are responsible for ordering, controlling and monitoring all the components of the vehicle itself. Each of these units can also send and receive information to other units on the network or externally. For most vehicles, the controller area network (CAN) is the main communication protocol and system used to build their internal network. Technological development, the growing integration of devices and the numerous advances in the field of connectivity have allowed the vehicle to become connected, and the flow of information exchanged between the various ECUs (electronic control units) becomes increasingly important and varied. Furthermore, the vehicle itself is capable of exchanging information with other vehicles, with the surrounding environment and with the Internet. As shown by the CARDIAN project, this type of innovation allows the user an increasingly safe and varied driving experience, but at the same time, it introduces a series of vulnerabilities and dangers due to the connection itself. The job of making the vehicle safe therefore becomes critical. In recent years, it has been demonstrated in multiple ways how easy it is to compromise the safety of a vehicle and its passengers by injecting malicious messages into the CAN network present inside the vehicle itself. The purpose of this article is the construction of a system that, integrated within the vehicle network, is able to effectively recognize any type of intrusion and tampering.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"72 8","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139150146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol 智能电网安全:基于 PUF 的身份验证和密钥协议协议
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-28 DOI: 10.3390/fi16010009
N. Bagheri, Y. Bendavid, M. Safkhani, S. Rostampour
A smart grid is an electricity network that uses advanced technologies to facilitate the exchange of information and electricity between utility companies and customers. Although most of the technologies involved in such grids have reached maturity, smart meters—as connected devices—introduce new security challenges. To overcome this significant obstacle to grid modernization, safeguarding privacy has emerged as a paramount concern. In this paper, we begin by evaluating the security levels of recently proposed authentication methods for smart meters. Subsequently, we introduce an enhanced protocol named PPSG, designed for smart grids, which incorporates physical unclonable functions (PUF) and an elliptic curve cryptography (ECC) module to address the vulnerabilities identified in previous approaches. Our security analysis, utilizing a real-or-random (RoR) model, demonstrates that PPSG effectively mitigates the weaknesses found in prior methods. To assess the practicality of PPSG, we conduct simulations using an Arduino UNO board, measuring computation, communication, and energy costs. Our results, including a processing time of 153 ms, a communication cost of 1376 bits, and an energy consumption of 13.468 mJ, align with the requirements of resource-constrained devices within smart grids.
智能电网是一种利用先进技术促进公用事业公司与客户之间信息和电力交换的电力网络。虽然此类电网所涉及的大多数技术已经成熟,但智能电表作为联网设备,带来了新的安全挑战。为了克服电网现代化的这一重大障碍,保护隐私已成为人们最关心的问题。在本文中,我们首先评估了最近提出的智能电表认证方法的安全级别。随后,我们介绍了一种专为智能电网设计的增强型协议,名为 PPSG,它结合了物理不可解函数(PUF)和椭圆曲线加密算法(ECC)模块,以解决以往方法中发现的漏洞。我们利用真实或随机(RoR)模型进行的安全分析表明,PPSG 能有效缓解之前方法中发现的弱点。为了评估 PPSG 的实用性,我们使用 Arduino UNO 板进行了模拟,测量了计算、通信和能源成本。我们的结果,包括 153 毫秒的处理时间、1376 比特的通信成本和 13.468 兆焦耳的能耗,符合智能电网中资源受限设备的要求。
{"title":"Smart Grid Security: A PUF-Based Authentication and Key Agreement Protocol","authors":"N. Bagheri, Y. Bendavid, M. Safkhani, S. Rostampour","doi":"10.3390/fi16010009","DOIUrl":"https://doi.org/10.3390/fi16010009","url":null,"abstract":"A smart grid is an electricity network that uses advanced technologies to facilitate the exchange of information and electricity between utility companies and customers. Although most of the technologies involved in such grids have reached maturity, smart meters—as connected devices—introduce new security challenges. To overcome this significant obstacle to grid modernization, safeguarding privacy has emerged as a paramount concern. In this paper, we begin by evaluating the security levels of recently proposed authentication methods for smart meters. Subsequently, we introduce an enhanced protocol named PPSG, designed for smart grids, which incorporates physical unclonable functions (PUF) and an elliptic curve cryptography (ECC) module to address the vulnerabilities identified in previous approaches. Our security analysis, utilizing a real-or-random (RoR) model, demonstrates that PPSG effectively mitigates the weaknesses found in prior methods. To assess the practicality of PPSG, we conduct simulations using an Arduino UNO board, measuring computation, communication, and energy costs. Our results, including a processing time of 153 ms, a communication cost of 1376 bits, and an energy consumption of 13.468 mJ, align with the requirements of resource-constrained devices within smart grids.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"347 11","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139152039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing User Bandwidth Resources in Information-Centric Networking through Blockchain-Based Incentive Mechanism 通过基于区块链的激励机制在以信息为中心的网络中利用用户带宽资源
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-28 DOI: 10.3390/fi16010011
Qiang Liu, Rui Han, Yang Li
Idle bandwidth resources are inefficiently distributed among different users. Currently, the utilization of user bandwidth resources mostly relies on traditional IP networks, implementing relevant techniques at the application layer, which creates scalability issues and brings additional system overheads. Information-Centric Networking (ICN), based on the idea of separating identifiers and locators, offers the potential to aggregate idle bandwidth resources from a network layer perspective. This paper proposes a method for utilizing user bandwidth resources in ICN; specifically, we treat the use of user bandwidth resources as a service and assign service IDs (identifiers), and when network congestion (the network nodes are overloaded) occurs, the traffic can be routed to the user side for forwarding through the ID/NA (Network Address) cooperative routing mechanism of ICN, thereby improving the scalability of ICN transmission and the utilization of underlying network resources. To enhance the willingness of users to contribute idle bandwidth resources, we establish a secure and trustworthy bandwidth trading market using blockchain technology. We also design an incentive mechanism based on the Proof-of-Network-Contribution (PoNC) consensus algorithm; users can “mine” by forwarding packets. The experimental results show that utilizing idle bandwidth can significantly improve the scalability of ICN transmission under experimental conditions, bringing a maximum throughput improvement of 19.4% and reducing the packet loss rate. Compared with existing methods, using ICN technology to aggregate idle bandwidth for network transmission will have a more stable and lower latency, and it brings a maximum utilization improvement of 13.7%.
闲置带宽资源在不同用户之间的分配效率低下。目前,用户带宽资源的利用大多依赖于传统的 IP 网络,在应用层实施相关技术,这会产生可扩展性问题,并带来额外的系统开销。以信息为中心的网络(ICN)基于标识符和定位符分离的思想,从网络层的角度为聚合闲置带宽资源提供了可能。本文提出了一种在 ICN 中利用用户带宽资源的方法,具体来说,我们将用户带宽资源的使用视为一种服务,并分配服务 ID(标识符),当网络拥塞(网络节点过载)时,可通过 ICN 的 ID/NA(网络地址)协同路由机制将流量路由到用户侧进行转发,从而提高 ICN 传输的可扩展性和底层网络资源的利用率。为了提高用户贡献闲置带宽资源的意愿,我们利用区块链技术建立了一个安全可信的带宽交易市场。我们还设计了一种基于网络贡献证明(PoNC)共识算法的激励机制;用户可以通过转发数据包来 "挖矿"。实验结果表明,在实验条件下,利用闲置带宽可以显著提高 ICN 传输的可扩展性,最大吞吐量提高了 19.4%,并降低了丢包率。与现有方法相比,利用 ICN 技术聚合闲置带宽进行网络传输将具有更稳定、更低的延迟,并带来 13.7% 的最大利用率提升。
{"title":"Utilizing User Bandwidth Resources in Information-Centric Networking through Blockchain-Based Incentive Mechanism","authors":"Qiang Liu, Rui Han, Yang Li","doi":"10.3390/fi16010011","DOIUrl":"https://doi.org/10.3390/fi16010011","url":null,"abstract":"Idle bandwidth resources are inefficiently distributed among different users. Currently, the utilization of user bandwidth resources mostly relies on traditional IP networks, implementing relevant techniques at the application layer, which creates scalability issues and brings additional system overheads. Information-Centric Networking (ICN), based on the idea of separating identifiers and locators, offers the potential to aggregate idle bandwidth resources from a network layer perspective. This paper proposes a method for utilizing user bandwidth resources in ICN; specifically, we treat the use of user bandwidth resources as a service and assign service IDs (identifiers), and when network congestion (the network nodes are overloaded) occurs, the traffic can be routed to the user side for forwarding through the ID/NA (Network Address) cooperative routing mechanism of ICN, thereby improving the scalability of ICN transmission and the utilization of underlying network resources. To enhance the willingness of users to contribute idle bandwidth resources, we establish a secure and trustworthy bandwidth trading market using blockchain technology. We also design an incentive mechanism based on the Proof-of-Network-Contribution (PoNC) consensus algorithm; users can “mine” by forwarding packets. The experimental results show that utilizing idle bandwidth can significantly improve the scalability of ICN transmission under experimental conditions, bringing a maximum throughput improvement of 19.4% and reducing the packet loss rate. Compared with existing methods, using ICN technology to aggregate idle bandwidth for network transmission will have a more stable and lower latency, and it brings a maximum utilization improvement of 13.7%.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"50 6","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139151797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latent Autoregressive Student-t Prior Process Models to Assess Impact of Interventions in Time Series 评估干预措施对时间序列影响的潜在自回归 Student-t 先验过程模型
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-28 DOI: 10.3390/fi16010008
Patrick Toman, N. Ravishanker, Nathan Lally, S. Rajasekaran
With the advent of the “Internet of Things” (IoT), insurers are increasingly leveraging remote sensor technology in the development of novel insurance products and risk management programs. For example, Hartford Steam Boiler’s (HSB) IoT freeze loss program uses IoT temperature sensors to monitor indoor temperatures in locations at high risk of water-pipe burst (freeze loss) with the goal of reducing insurances losses via real-time monitoring of the temperature data streams. In the event these monitoring systems detect a potentially risky temperature environment, an alert is sent to the end-insured (business manager, tenant, maintenance staff, etc.), prompting them to take remedial action by raising temperatures. In the event that an alert is sent and freeze loss occurs, the firm is not liable for any damages incurred by the event. For the program to be effective, there must be a reliable method of verifying if customers took appropriate corrective action after receiving an alert. Due to the program’s scale, direct follow up via text or phone calls is not possible for every alert event. In addition, direct feedback from customers is not necessarily reliable. In this paper, we propose the use of a non-linear, auto-regressive time series model, coupled with the time series intervention analysis method known as causal impact, to directly evaluate whether or not a customer took action directly from IoT temperature streams. Our method offers several distinct advantages over other methods as it is (a) readily scalable with continued program growth, (b) entirely automated, and (c) inherently less biased than human labelers or direct customer response. We demonstrate the efficacy of our method using a sample of actual freeze alert events from the freeze loss program.
随着 "物联网"(IoT)时代的到来,保险公司越来越多地利用远程传感器技术开发新型保险产品和风险管理计划。例如,哈特福德蒸汽锅炉公司(HSB)的物联网冰冻损失计划利用物联网温度传感器监控水管爆裂(冰冻损失)高风险地点的室内温度,目的是通过实时监控温度数据流来减少保险损失。一旦这些监控系统检测到潜在风险的温度环境,就会向最终被保险人(业务经理、租户、维护人员等)发送警报,提示他们采取补救措施,提高温度。如果警报发出后发生冻结损失,公司不承担由此造成的任何损失。为使该计划行之有效,必须有一种可靠的方法来核实客户在收到警报后是否采取了适当的纠正措施。由于该计划的规模,不可能对每个警报事件都通过短信或电话进行直接跟进。此外,客户的直接反馈也不一定可靠。在本文中,我们建议使用非线性、自动回归时间序列模型,结合称为因果影响的时间序列干预分析方法,直接评估客户是否直接从物联网温度流中采取行动。与其他方法相比,我们的方法具有以下几个明显优势:(a) 可随着程序的持续增长而随时扩展;(b) 完全自动化;(c) 本质上比人工贴标或直接客户响应更少偏差。我们使用冰冻损失计划中的实际冰冻警报事件样本来证明我们方法的有效性。
{"title":"Latent Autoregressive Student-t Prior Process Models to Assess Impact of Interventions in Time Series","authors":"Patrick Toman, N. Ravishanker, Nathan Lally, S. Rajasekaran","doi":"10.3390/fi16010008","DOIUrl":"https://doi.org/10.3390/fi16010008","url":null,"abstract":"With the advent of the “Internet of Things” (IoT), insurers are increasingly leveraging remote sensor technology in the development of novel insurance products and risk management programs. For example, Hartford Steam Boiler’s (HSB) IoT freeze loss program uses IoT temperature sensors to monitor indoor temperatures in locations at high risk of water-pipe burst (freeze loss) with the goal of reducing insurances losses via real-time monitoring of the temperature data streams. In the event these monitoring systems detect a potentially risky temperature environment, an alert is sent to the end-insured (business manager, tenant, maintenance staff, etc.), prompting them to take remedial action by raising temperatures. In the event that an alert is sent and freeze loss occurs, the firm is not liable for any damages incurred by the event. For the program to be effective, there must be a reliable method of verifying if customers took appropriate corrective action after receiving an alert. Due to the program’s scale, direct follow up via text or phone calls is not possible for every alert event. In addition, direct feedback from customers is not necessarily reliable. In this paper, we propose the use of a non-linear, auto-regressive time series model, coupled with the time series intervention analysis method known as causal impact, to directly evaluate whether or not a customer took action directly from IoT temperature streams. Our method offers several distinct advantages over other methods as it is (a) readily scalable with continued program growth, (b) entirely automated, and (c) inherently less biased than human labelers or direct customer response. We demonstrate the efficacy of our method using a sample of actual freeze alert events from the freeze loss program.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"351 14‐15","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139149115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1