首页 > 最新文献

Future Internet最新文献

英文 中文
Energy Consumption Reduction in Wireless Sensor Network-Based Water Pipeline Monitoring Systems via Energy Conservation Techniques 通过节能技术降低基于无线传感器网络的输水管道监测系统的能耗
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-14 DOI: 10.3390/fi15120402
Valery Nkemeni, Fabien Mieyeville, Pierre Tsafack
In wireless sensor network-based water pipeline monitoring (WWPM) systems, a vital requirement emerges: the achievement of low energy consumption. This primary goal arises from the fundamental necessity to ensure the sustained operability of sensor nodes over extended durations, all without the need for frequent battery replacement. Given that sensor nodes in such applications are typically battery-powered and often physically inaccessible, maximizing energy efficiency by minimizing unnecessary energy consumption is of vital importance. This paper presents an experimental study that investigates the impact of a hybrid technique, incorporating distributed computing, hierarchical sensing, and duty cycling, on the energy consumption of a sensor node in prolonging the lifespan of a WWPM system. A custom sensor node is designed using the ESP32 MCU and nRF24L01+ transceiver. Hierarchical sensing is implemented through the use of LSM9DS1 and ADXL344 accelerometers, distributed computing through the implementation of a distributed Kalman filter, and duty cycling through the implementation of interrupt-enabled sleep/wakeup functionality. The experimental results reveal that combining distributed computing, hierarchical sensing and duty cycling reduces energy consumption by a factor of eight compared to the lone implementation of distributed computing.
在基于无线传感器网络的输水管道监测(WWPM)系统中,出现了一个至关重要的要求:实现低能耗。这一主要目标源于确保传感器节点在无需频繁更换电池的情况下长时间持续工作的基本需要。鉴于此类应用中的传感器节点通常由电池供电,而且往往物理上无法访问,因此通过减少不必要的能耗来最大限度地提高能效至关重要。本文介绍了一项实验研究,调查了一种混合技术(包含分布式计算、分层传感和占空比)对传感器节点能耗的影响,以延长 WWPM 系统的使用寿命。使用 ESP32 MCU 和 nRF24L01+ 收发器设计了一个定制传感器节点。通过使用 LSM9DS1 和 ADXL344 加速计实现了分层传感,通过使用分布式卡尔曼滤波器实现了分布式计算,通过使用中断睡眠/唤醒功能实现了占空比循环。实验结果表明,与单独实施分布式计算相比,将分布式计算、分层传感和占空比结合在一起可将能耗降低 8 倍。
{"title":"Energy Consumption Reduction in Wireless Sensor Network-Based Water Pipeline Monitoring Systems via Energy Conservation Techniques","authors":"Valery Nkemeni, Fabien Mieyeville, Pierre Tsafack","doi":"10.3390/fi15120402","DOIUrl":"https://doi.org/10.3390/fi15120402","url":null,"abstract":"In wireless sensor network-based water pipeline monitoring (WWPM) systems, a vital requirement emerges: the achievement of low energy consumption. This primary goal arises from the fundamental necessity to ensure the sustained operability of sensor nodes over extended durations, all without the need for frequent battery replacement. Given that sensor nodes in such applications are typically battery-powered and often physically inaccessible, maximizing energy efficiency by minimizing unnecessary energy consumption is of vital importance. This paper presents an experimental study that investigates the impact of a hybrid technique, incorporating distributed computing, hierarchical sensing, and duty cycling, on the energy consumption of a sensor node in prolonging the lifespan of a WWPM system. A custom sensor node is designed using the ESP32 MCU and nRF24L01+ transceiver. Hierarchical sensing is implemented through the use of LSM9DS1 and ADXL344 accelerometers, distributed computing through the implementation of a distributed Kalman filter, and duty cycling through the implementation of interrupt-enabled sleep/wakeup functionality. The experimental results reveal that combining distributed computing, hierarchical sensing and duty cycling reduces energy consumption by a factor of eight compared to the lone implementation of distributed computing.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"2018 24","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139002063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning for Intrusion Detection Systems in Internet of Vehicles: A General Taxonomy, Applications, and Future Directions 车联网入侵检测系统的联合学习:一般分类、应用和未来方向
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-14 DOI: 10.3390/fi15120403
Jadil Alsamiri, Khalid Alsubhi
In recent years, the Internet of Vehicles (IoV) has garnered significant attention from researchers and automotive industry professionals due to its expanding range of applications and services aimed at enhancing road safety and driver/passenger comfort. However, the massive amount of data spread across this network makes securing it challenging. The IoV network generates, collects, and processes vast amounts of valuable and sensitive data that intruders can manipulate. An intrusion detection system (IDS) is the most typical method to protect such networks. An IDS monitors activity on the road to detect any sign of a security threat and generates an alert if a security anomaly is detected. Applying machine learning methods to large datasets helps detect anomalies, which can be utilized to discover potential intrusions. However, traditional centralized learning algorithms require gathering data from end devices and centralizing it for training on a single device. Vehicle makers and owners may not readily share the sensitive data necessary for training the models. Granting a single device access to enormous volumes of personal information raises significant privacy concerns, as any system-related problems could result in massive data leaks. To alleviate these problems, more secure options, such as Federated Learning (FL), must be explored. A decentralized machine learning technique, FL allows model training on client devices while maintaining user data privacy. Although FL for IDS has made significant progress, to our knowledge, there has been no comprehensive survey specifically dedicated to exploring the applications of FL for IDS in the IoV environment, similar to successful systems research in deep learning. To address this gap, we undertake a well-organized literature review on IDSs based on FL in an IoV environment. We introduce a general taxonomy to describe the FL systems to ensure a coherent structure and guide future research. Additionally, we identify the relevant state of the art in FL-based intrusion detection within the IoV domain, covering the years from FL’s inception in 2016 through 2023. Finally, we identify challenges and future research directions based on the existing literature.
近年来,车联网(IoV)因其旨在提高道路安全和驾驶员/乘客舒适度的应用和服务范围不断扩大而备受研究人员和汽车行业专业人士的关注。然而,分布在该网络上的海量数据使其安全保障面临挑战。IoV 网络会生成、收集和处理大量有价值的敏感数据,入侵者可对其进行操纵。入侵检测系统 (IDS) 是保护此类网络的最典型方法。IDS 监控道路上的活动,以检测任何安全威胁的迹象,并在检测到安全异常时发出警报。将机器学习方法应用于大型数据集有助于检测异常,从而发现潜在的入侵。然而,传统的集中式学习算法需要从终端设备收集数据,并集中在单个设备上进行训练。汽车制造商和车主可能不会轻易分享训练模型所需的敏感数据。允许单个设备访问大量个人信息会引发严重的隐私问题,因为任何与系统相关的问题都可能导致大量数据泄露。为了缓解这些问题,必须探索更安全的方案,如联合学习(FL)。作为一种分散的机器学习技术,FL 允许在客户端设备上进行模型训练,同时维护用户数据隐私。尽管用于 IDS 的 FL 已取得重大进展,但据我们所知,还没有专门用于探索 IoV 环境中用于 IDS 的 FL 应用的全面调查,类似于深度学习方面的成功系统研究。为了填补这一空白,我们对物联网环境中基于 FL 的 IDS 进行了精心组织的文献综述。我们引入了一个通用分类法来描述 FL 系统,以确保结构的连贯性并指导未来的研究。此外,我们还确定了 IoV 领域中基于 FL 的入侵检测的相关技术水平,涵盖了从 2016 年 FL 诞生到 2023 年的时间。最后,我们在现有文献的基础上确定了挑战和未来研究方向。
{"title":"Federated Learning for Intrusion Detection Systems in Internet of Vehicles: A General Taxonomy, Applications, and Future Directions","authors":"Jadil Alsamiri, Khalid Alsubhi","doi":"10.3390/fi15120403","DOIUrl":"https://doi.org/10.3390/fi15120403","url":null,"abstract":"In recent years, the Internet of Vehicles (IoV) has garnered significant attention from researchers and automotive industry professionals due to its expanding range of applications and services aimed at enhancing road safety and driver/passenger comfort. However, the massive amount of data spread across this network makes securing it challenging. The IoV network generates, collects, and processes vast amounts of valuable and sensitive data that intruders can manipulate. An intrusion detection system (IDS) is the most typical method to protect such networks. An IDS monitors activity on the road to detect any sign of a security threat and generates an alert if a security anomaly is detected. Applying machine learning methods to large datasets helps detect anomalies, which can be utilized to discover potential intrusions. However, traditional centralized learning algorithms require gathering data from end devices and centralizing it for training on a single device. Vehicle makers and owners may not readily share the sensitive data necessary for training the models. Granting a single device access to enormous volumes of personal information raises significant privacy concerns, as any system-related problems could result in massive data leaks. To alleviate these problems, more secure options, such as Federated Learning (FL), must be explored. A decentralized machine learning technique, FL allows model training on client devices while maintaining user data privacy. Although FL for IDS has made significant progress, to our knowledge, there has been no comprehensive survey specifically dedicated to exploring the applications of FL for IDS in the IoV environment, similar to successful systems research in deep learning. To address this gap, we undertake a well-organized literature review on IDSs based on FL in an IoV environment. We introduce a general taxonomy to describe the FL systems to ensure a coherent structure and guide future research. Additionally, we identify the relevant state of the art in FL-based intrusion detection within the IoV domain, covering the years from FL’s inception in 2016 through 2023. Finally, we identify challenges and future research directions based on the existing literature.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"52 1","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138975086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Denial of Service Classification for Software-Defined Networking Using Grammatical Evolution 利用语法进化为软件定义网络进行分布式拒绝服务分类
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-13 DOI: 10.3390/fi15120401
E. Spyrou, Ioannis Tsoulos, C. Stylios
Software-Defined Networking (SDN) stands as a pivotal paradigm in network implementation, exerting a profound influence on the trajectory of technological advancement. The critical role of security within SDN cannot be overstated, with distributed denial of service (DDoS) emerging as a particularly disruptive threat, capable of causing large-scale disruptions. DDoS operates by generating malicious traffic that mimics normal network activity, leading to service disruptions. It becomes imperative to deploy mechanisms capable of distinguishing between benign and malicious traffic, serving as the initial line of defense against DDoS challenges. In addressing this concern, we propose the utilization of traffic classification as a foundational strategy for combatting DDoS. By categorizing traffic into malicious and normal streams, we establish a crucial first step in the development of effective DDoS mitigation strategies. The deleterious effects of DDoS extend to the point of potentially overwhelming networked servers, resulting in service failures and SDN server downtimes. To investigate and address this issue, our research employs a dataset encompassing both benign and malicious traffic within the SDN environment. A set of 23 features is harnessed for classification purposes, forming the basis for a comprehensive analysis and the development of robust defense mechanisms against DDoS in SDN. Initially, we compare GenClass with three common classification methods, namely the Bayes, K-Nearest Neighbours (KNN), and Random Forest methods. The proposed solution improves the average class error, demonstrating 6.58% error as opposed to the Bayes method error of 32.59%, KNN error of 18.45%, and Random Forest error of 30.70%. Moreover, we utilize classification procedures based on three methods based on grammatical evolution, which are applied to the aforementioned data. In particular, in terms of average class error, GenClass exhibits 6.58%, while NNC and FC2GEN exhibit average class errors of 12.51% and 15.86%, respectively.
软件定义网络(SDN)是网络实施的关键范例,对技术进步的轨迹产生了深远影响。分布式拒绝服务(DDoS)是一种特别具有破坏性的威胁,能够造成大规模的网络中断。DDoS 通过模拟正常网络活动生成恶意流量,导致服务中断。当务之急是部署能够区分良性和恶意流量的机制,作为应对 DDoS 挑战的第一道防线。为解决这一问题,我们建议利用流量分类作为对抗 DDoS 的基础策略。通过将流量分为恶意流和正常流,我们为制定有效的 DDoS 缓解策略迈出了关键的第一步。DDoS 的有害影响可能会使网络服务器不堪重负,从而导致服务故障和 SDN 服务器宕机。为了研究和解决这一问题,我们的研究采用了一个数据集,其中包括 SDN 环境中的良性流量和恶意流量。我们利用一组 23 个特征进行分类,为全面分析和开发针对 SDN 中 DDoS 的强大防御机制奠定了基础。最初,我们将 GenClass 与贝叶斯、K-近邻(KNN)和随机森林三种常见分类方法进行了比较。与贝叶斯方法 32.59% 的误差、KNN 方法 18.45% 的误差和随机森林方法 30.70% 的误差相比,所提出的解决方案改善了平均分类误差,误差率为 6.58%。此外,我们还利用了基于语法演变的三种方法的分类程序,并将其应用于上述数据。其中,GenClass 的平均分类错误率为 6.58%,而 NNC 和 FC2GEN 的平均分类错误率分别为 12.51% 和 15.86%。
{"title":"Distributed Denial of Service Classification for Software-Defined Networking Using Grammatical Evolution","authors":"E. Spyrou, Ioannis Tsoulos, C. Stylios","doi":"10.3390/fi15120401","DOIUrl":"https://doi.org/10.3390/fi15120401","url":null,"abstract":"Software-Defined Networking (SDN) stands as a pivotal paradigm in network implementation, exerting a profound influence on the trajectory of technological advancement. The critical role of security within SDN cannot be overstated, with distributed denial of service (DDoS) emerging as a particularly disruptive threat, capable of causing large-scale disruptions. DDoS operates by generating malicious traffic that mimics normal network activity, leading to service disruptions. It becomes imperative to deploy mechanisms capable of distinguishing between benign and malicious traffic, serving as the initial line of defense against DDoS challenges. In addressing this concern, we propose the utilization of traffic classification as a foundational strategy for combatting DDoS. By categorizing traffic into malicious and normal streams, we establish a crucial first step in the development of effective DDoS mitigation strategies. The deleterious effects of DDoS extend to the point of potentially overwhelming networked servers, resulting in service failures and SDN server downtimes. To investigate and address this issue, our research employs a dataset encompassing both benign and malicious traffic within the SDN environment. A set of 23 features is harnessed for classification purposes, forming the basis for a comprehensive analysis and the development of robust defense mechanisms against DDoS in SDN. Initially, we compare GenClass with three common classification methods, namely the Bayes, K-Nearest Neighbours (KNN), and Random Forest methods. The proposed solution improves the average class error, demonstrating 6.58% error as opposed to the Bayes method error of 32.59%, KNN error of 18.45%, and Random Forest error of 30.70%. Moreover, we utilize classification procedures based on three methods based on grammatical evolution, which are applied to the aforementioned data. In particular, in terms of average class error, GenClass exhibits 6.58%, while NNC and FC2GEN exhibit average class errors of 12.51% and 15.86%, respectively.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"2 4","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139004690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Blockchain-Based Federated Learning 基于区块链的联合学习调查
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-12 DOI: 10.3390/fi15120400
Lang Wu, Weijian Ruan, Jinhui Hu, Yaobin He
Federated learning (FL) and blockchains exhibit significant commonality, complementarity, and alignment in various aspects, such as application domains, architectural features, and privacy protection mechanisms. In recent years, there have been notable advancements in combining these two technologies, particularly in data privacy protection, data sharing incentives, and computational performance. Although there are some surveys on blockchain-based federated learning (BFL), these surveys predominantly focus on the BFL framework and its classifications, yet lack in-depth analyses of the pivotal issues addressed by BFL. This work aims to assist researchers in understanding the latest research achievements and development directions in the integration of FL with blockchains. Firstly, we introduced the relevant research in FL and blockchain technology and highlighted the existing shortcomings of FL. Next, we conducted a comparative analysis of existing BFL frameworks, delving into the significant problems in the realm of FL that the combination of blockchain and FL addresses. Finally, we summarized the application prospects of BFL technology in various domains such as the Internet of Things, Industrial Internet of Things, Internet of Vehicles, and healthcare services, as well as the challenges that need to be addressed and future research directions.
联盟学习(FL)和区块链在应用领域、架构特点和隐私保护机制等各个方面表现出显著的共性、互补性和一致性。近年来,这两种技术的结合取得了显著进展,特别是在数据隐私保护、数据共享激励和计算性能方面。虽然有一些关于基于区块链的联合学习(BFL)的调查,但这些调查主要集中在 BFL 框架及其分类上,缺乏对 BFL 所解决的关键问题的深入分析。本研究旨在帮助研究人员了解FL与区块链结合的最新研究成果和发展方向。首先,我们介绍了 FL 与区块链技术的相关研究,并强调了 FL 目前存在的不足。其次,我们对现有的 BFL 框架进行了对比分析,深入探讨了区块链与 FL 结合所要解决的 FL 领域的重大问题。最后,我们总结了 BFL 技术在物联网、工业物联网、车联网和医疗服务等各个领域的应用前景,以及需要应对的挑战和未来的研究方向。
{"title":"A Survey on Blockchain-Based Federated Learning","authors":"Lang Wu, Weijian Ruan, Jinhui Hu, Yaobin He","doi":"10.3390/fi15120400","DOIUrl":"https://doi.org/10.3390/fi15120400","url":null,"abstract":"Federated learning (FL) and blockchains exhibit significant commonality, complementarity, and alignment in various aspects, such as application domains, architectural features, and privacy protection mechanisms. In recent years, there have been notable advancements in combining these two technologies, particularly in data privacy protection, data sharing incentives, and computational performance. Although there are some surveys on blockchain-based federated learning (BFL), these surveys predominantly focus on the BFL framework and its classifications, yet lack in-depth analyses of the pivotal issues addressed by BFL. This work aims to assist researchers in understanding the latest research achievements and development directions in the integration of FL with blockchains. Firstly, we introduced the relevant research in FL and blockchain technology and highlighted the existing shortcomings of FL. Next, we conducted a comparative analysis of existing BFL frameworks, delving into the significant problems in the realm of FL that the combination of blockchain and FL addresses. Finally, we summarized the application prospects of BFL technology in various domains such as the Internet of Things, Industrial Internet of Things, Internet of Vehicles, and healthcare services, as well as the challenges that need to be addressed and future research directions.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"40 10","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139007002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Addressing the Gaps of IoU Loss in 3D Object Detection with IIoU 利用 IIoU 解决 3D 物体检测中 IoU 丢失的问题
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-11 DOI: 10.3390/fi15120399
N. Ravi, Mohamed El-Sharkawy
Three-dimensional object detection involves estimating the dimensions, orientations, and locations of 3D bounding boxes. Intersection of Union (IoU) loss measures the overlap between predicted 3D box and ground truth 3D bounding boxes. The localization task uses smooth-L1 loss with IoU to estimate the object’s location, and the classification task identifies the object/class category inside each 3D bounding box. Localization suffers a performance gap in cases where the predicted and ground truth boxes overlap significantly less or do not overlap, indicating the boxes are far away, and in scenarios where the boxes are inclusive. Existing axis-aligned IoU losses suffer performance drop in cases of rotated 3D bounding boxes. This research addresses the shortcomings in bounding box regression problems of 3D object detection by introducing an Improved Intersection Over Union (IIoU) loss. The proposed loss function’s performance is experimented on LiDAR-based and Camera-LiDAR-based fusion methods using the KITTI dataset.
三维物体检测包括估计三维边界框的尺寸、方向和位置。联合交叉(IoU)损失测量预测的三维边界框与地面实况三维边界框之间的重叠程度。定位任务使用平滑-L1 损失和 IoU 来估计物体的位置,分类任务则识别每个三维边界框内的物体/类别。在预测方框和地面实况方框重叠较少或不重叠的情况下(表明方框距离较远),以及在方框具有包容性的情况下,定位会出现性能差距。在旋转三维边界框的情况下,现有的轴对齐 IoU 损失会导致性能下降。针对三维物体检测中边界框回归问题的不足,本研究引入了改进的 "交集大于联合"(IIoU)损失。利用 KITTI 数据集,在基于激光雷达和基于相机-激光雷达的融合方法上对所提出的损失函数的性能进行了实验。
{"title":"Addressing the Gaps of IoU Loss in 3D Object Detection with IIoU","authors":"N. Ravi, Mohamed El-Sharkawy","doi":"10.3390/fi15120399","DOIUrl":"https://doi.org/10.3390/fi15120399","url":null,"abstract":"Three-dimensional object detection involves estimating the dimensions, orientations, and locations of 3D bounding boxes. Intersection of Union (IoU) loss measures the overlap between predicted 3D box and ground truth 3D bounding boxes. The localization task uses smooth-L1 loss with IoU to estimate the object’s location, and the classification task identifies the object/class category inside each 3D bounding box. Localization suffers a performance gap in cases where the predicted and ground truth boxes overlap significantly less or do not overlap, indicating the boxes are far away, and in scenarios where the boxes are inclusive. Existing axis-aligned IoU losses suffer performance drop in cases of rotated 3D bounding boxes. This research addresses the shortcomings in bounding box regression problems of 3D object detection by introducing an Improved Intersection Over Union (IIoU) loss. The proposed loss function’s performance is experimented on LiDAR-based and Camera-LiDAR-based fusion methods using the KITTI dataset.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"35 8","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139010245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PROFEE: A Probabilistic-Feedback Based Speed Rate Adaption for IEEE 802.11bc PROFEE:基于概率反馈的 IEEE 802.11bc 速率自适应算法
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-09 DOI: 10.3390/fi15120396
Javier Gómez, J. Camacho-Escoto, Luis Orozco-Barbosa, Diego Rodriguez-Torres
WiFi is a widely used wireless technology for data transmission. WiFi can also play a crucial role in simultaneously broadcasting content to multiple devices in multimedia transmission for venues such as classrooms, theaters, and stadiums, etc. Broadcasting allows for the efficient dissemination of information to all devices connected to the network, and it becomes crucial to ensure that the WiFi network has sufficient capacity to transmit broadcast multimedia content without interruptions or delays. However, using WiFi for broadcasting presents challenges that can impact user experience, specifically the difficulty of obtaining real-time feedback from potentially hundreds or thousands of users due to potential collisions of feedback messages. This work focuses on providing accurate feedback to the Access Point about the percentage of users not receiving broadcast traffic correctly so it can adjust its Modulation and Coding Scheme (MCS) while transmitting broadcast multimedia content to many users. The proposed method is comprised of two sequential algorithms. In order to reduce the probability of a collision after transmitting each message, an algorithm searches for the best probability value for users to transmit ACK/NACK messages, depending on whether messages are received correctly or not. This feedback allows the Access Point to estimate the number of STAs correctly/incorrectly receiving the messages being transmitted. A second algorithm uses this estimation so the Access Point can select the best MCS while maintaining the percentage of users not receiving broadcast content correctly within acceptable margins, thus providing users with the best possible content quality. We implemented the proposed method in the ns-3 simulator, and the results show it yields quick, reliable feedback to the Access Point that was then able to adjust to the best possible MCS in only a few seconds, regardless of the user density and dimensions of the scenario.
WiFi 是一种广泛应用的数据传输无线技术。在教室、剧院和体育馆等场所的多媒体传输中,WiFi 在向多台设备同时广播内容方面也能发挥重要作用。广播可以向连接到网络的所有设备有效地传播信息,因此确保 WiFi 网络有足够的容量来传输广播多媒体内容而不会出现中断或延迟就变得至关重要。不过,使用 WiFi 进行广播也会带来一些影响用户体验的挑战,特别是由于反馈信息可能会发生碰撞,因此很难从成百上千的用户那里获得实时反馈。这项工作的重点是向接入点提供有关未正确接收广播流量的用户比例的准确反馈,以便接入点在向众多用户传输广播多媒体内容时调整其调制和编码方案(MCS)。建议的方法由两个连续算法组成。为了降低发送每条信息后发生碰撞的概率,一种算法会根据信息是否被正确接收,为用户搜索发送 ACK/NACK 信息的最佳概率值。通过这种反馈,接入点可以估算出正确/不正确接收所传输信息的 STA 数量。第二种算法利用这种估计,使接入点可以选择最佳的 MCS,同时将未正确接收广播内容的用户比例保持在可接受的范围内,从而为用户提供最佳的内容质量。我们在 ns-3 模拟器中实施了所提出的方法,结果表明它能向接入点提供快速、可靠的反馈,无论用户密度和场景尺寸如何,接入点都能在几秒钟内调整到最佳 MCS。
{"title":"PROFEE: A Probabilistic-Feedback Based Speed Rate Adaption for IEEE 802.11bc","authors":"Javier Gómez, J. Camacho-Escoto, Luis Orozco-Barbosa, Diego Rodriguez-Torres","doi":"10.3390/fi15120396","DOIUrl":"https://doi.org/10.3390/fi15120396","url":null,"abstract":"WiFi is a widely used wireless technology for data transmission. WiFi can also play a crucial role in simultaneously broadcasting content to multiple devices in multimedia transmission for venues such as classrooms, theaters, and stadiums, etc. Broadcasting allows for the efficient dissemination of information to all devices connected to the network, and it becomes crucial to ensure that the WiFi network has sufficient capacity to transmit broadcast multimedia content without interruptions or delays. However, using WiFi for broadcasting presents challenges that can impact user experience, specifically the difficulty of obtaining real-time feedback from potentially hundreds or thousands of users due to potential collisions of feedback messages. This work focuses on providing accurate feedback to the Access Point about the percentage of users not receiving broadcast traffic correctly so it can adjust its Modulation and Coding Scheme (MCS) while transmitting broadcast multimedia content to many users. The proposed method is comprised of two sequential algorithms. In order to reduce the probability of a collision after transmitting each message, an algorithm searches for the best probability value for users to transmit ACK/NACK messages, depending on whether messages are received correctly or not. This feedback allows the Access Point to estimate the number of STAs correctly/incorrectly receiving the messages being transmitted. A second algorithm uses this estimation so the Access Point can select the best MCS while maintaining the percentage of users not receiving broadcast content correctly within acceptable margins, thus providing users with the best possible content quality. We implemented the proposed method in the ns-3 simulator, and the results show it yields quick, reliable feedback to the Access Point that was then able to adjust to the best possible MCS in only a few seconds, regardless of the user density and dimensions of the scenario.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"509 ","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138983237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Technologies for Next-Generation Smart Cities: A Comprehensive Review and Research Directions 下一代智能城市的使能技术:全面回顾与研究方向
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-09 DOI: 10.3390/fi15120398
Shrouk A. Ali, Shaimaa Ahmed Elsaid, Abdelhamied A. Ateya, Muhammed ElAffendi, A. El-latif
The concept of smart cities, which aim to enhance the quality of urban life through innovative technologies and policies, has gained significant momentum in recent years. As we approach the era of next-generation smart cities, it becomes crucial to explore the key enabling technologies that will shape their development. This work reviews the leading technologies driving the future of smart cities. The work begins by introducing the main requirements of different smart city applications; then, the enabling technologies are presented. This work highlights the transformative potential of the Internet of things (IoT) to facilitate data collection and analysis to improve urban infrastructure and services. As a complementary technology, distributed edge computing brings computational power closer to devices, reducing the reliance on centralized data centers. Another key technology is virtualization, which optimizes resource utilization, enabling multiple virtual environments to run efficiently on shared hardware. Software-defined networking (SDN) emerges as a pivotal technology that brings flexibility and scalability to smart city networks, allowing for dynamic network management and resource allocation. Artificial intelligence (AI) is another approach for managing smart cities by enabling predictive analytics, automation, and smart decision making based on vast amounts of data. Lastly, the blockchain is introduced as a promising approach for smart cities to achieve the required security. The review concludes by identifying potential research directions to address the challenges and complexities brought about by integrating these key enabling technologies.
近年来,旨在通过创新技术和政策提高城市生活质量的智慧城市概念获得了强劲的发展势头。随着下一代智慧城市时代的到来,探索影响其发展的关键使能技术变得至关重要。这项工作回顾了推动未来智慧城市发展的领先技术。作品首先介绍了不同智慧城市应用的主要要求,然后介绍了使能技术。这项工作强调了物联网(IoT)在促进数据收集和分析以改善城市基础设施和服务方面的变革潜力。作为一项补充技术,分布式边缘计算使计算能力更接近设备,从而减少了对集中式数据中心的依赖。另一项关键技术是虚拟化,它能优化资源利用率,使多个虚拟环境在共享硬件上高效运行。软件定义网络(SDN)是一项关键技术,可为智慧城市网络带来灵活性和可扩展性,实现动态网络管理和资源分配。人工智能(AI)是管理智慧城市的另一种方法,它可以在大量数据的基础上实现预测分析、自动化和智能决策。最后,介绍了区块链,将其作为智慧城市实现所需安全性的一种有前途的方法。综述最后确定了潜在的研究方向,以应对整合这些关键使能技术所带来的挑战和复杂性。
{"title":"Enabling Technologies for Next-Generation Smart Cities: A Comprehensive Review and Research Directions","authors":"Shrouk A. Ali, Shaimaa Ahmed Elsaid, Abdelhamied A. Ateya, Muhammed ElAffendi, A. El-latif","doi":"10.3390/fi15120398","DOIUrl":"https://doi.org/10.3390/fi15120398","url":null,"abstract":"The concept of smart cities, which aim to enhance the quality of urban life through innovative technologies and policies, has gained significant momentum in recent years. As we approach the era of next-generation smart cities, it becomes crucial to explore the key enabling technologies that will shape their development. This work reviews the leading technologies driving the future of smart cities. The work begins by introducing the main requirements of different smart city applications; then, the enabling technologies are presented. This work highlights the transformative potential of the Internet of things (IoT) to facilitate data collection and analysis to improve urban infrastructure and services. As a complementary technology, distributed edge computing brings computational power closer to devices, reducing the reliance on centralized data centers. Another key technology is virtualization, which optimizes resource utilization, enabling multiple virtual environments to run efficiently on shared hardware. Software-defined networking (SDN) emerges as a pivotal technology that brings flexibility and scalability to smart city networks, allowing for dynamic network management and resource allocation. Artificial intelligence (AI) is another approach for managing smart cities by enabling predictive analytics, automation, and smart decision making based on vast amounts of data. Lastly, the blockchain is introduced as a promising approach for smart cities to achieve the required security. The review concludes by identifying potential research directions to address the challenges and complexities brought about by integrating these key enabling technologies.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"581 ","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138983125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodological Approach for Identifying Websites with Infringing Content via Text Transformers and Dense Neural Networks 通过文本转换器和密集神经网络识别侵权内容网站的方法论
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-09 DOI: 10.3390/fi15120397
Aldo Hernandez-Suarez, G. Sánchez-Pérez, L. K. Toscano-Medina, Hector Perez-Meana, J. Portillo-Portillo, J. Olivares-Mercado
The rapid evolution of the Internet of Everything (IoE) has significantly enhanced global connectivity and multimedia content sharing, simultaneously escalating the unauthorized distribution of multimedia content, posing risks to intellectual property rights. In 2022 alone, about 130 billion accesses to potentially non-compliant websites were recorded, underscoring the challenges for industries reliant on copyright-protected assets. Amidst prevailing uncertainties and the need for technical and AI-integrated solutions, this study introduces two pivotal contributions. First, it establishes a novel taxonomy aimed at safeguarding and identifying IoE-based content infringements. Second, it proposes an innovative architecture combining IoE components with automated sensors to compile a dataset reflective of potential copyright breaches. This dataset is analyzed using a Bidirectional Encoder Representations from Transformers-based advanced Natural Language Processing (NLP) algorithm, further fine-tuned by a dense neural network (DNN), achieving a remarkable 98.71% accuracy in pinpointing websites that violate copyright.
万物互联(IoE)的快速发展大大加强了全球互联和多媒体内容共享,同时也加剧了未经授权的多媒体内容传播,给知识产权带来了风险。仅在 2022 年,就记录了约 1300 亿次对可能不合规网站的访问,这凸显了依赖版权保护资产的行业所面临的挑战。面对普遍存在的不确定性以及对技术和人工智能集成解决方案的需求,本研究提出了两个关键贡献。首先,它建立了一种新颖的分类法,旨在保护和识别基于物联网的内容侵权。其次,它提出了一种创新的架构,将物联网组件与自动传感器相结合,以编制反映潜在版权侵犯行为的数据集。该数据集使用基于变换器的双向编码器表示的高级自然语言处理(NLP)算法进行分析,并通过密集神经网络(DNN)进行进一步微调,在精确定位侵犯版权的网站方面取得了令人瞩目的 98.71% 的准确率。
{"title":"Methodological Approach for Identifying Websites with Infringing Content via Text Transformers and Dense Neural Networks","authors":"Aldo Hernandez-Suarez, G. Sánchez-Pérez, L. K. Toscano-Medina, Hector Perez-Meana, J. Portillo-Portillo, J. Olivares-Mercado","doi":"10.3390/fi15120397","DOIUrl":"https://doi.org/10.3390/fi15120397","url":null,"abstract":"The rapid evolution of the Internet of Everything (IoE) has significantly enhanced global connectivity and multimedia content sharing, simultaneously escalating the unauthorized distribution of multimedia content, posing risks to intellectual property rights. In 2022 alone, about 130 billion accesses to potentially non-compliant websites were recorded, underscoring the challenges for industries reliant on copyright-protected assets. Amidst prevailing uncertainties and the need for technical and AI-integrated solutions, this study introduces two pivotal contributions. First, it establishes a novel taxonomy aimed at safeguarding and identifying IoE-based content infringements. Second, it proposes an innovative architecture combining IoE components with automated sensors to compile a dataset reflective of potential copyright breaches. This dataset is analyzed using a Bidirectional Encoder Representations from Transformers-based advanced Natural Language Processing (NLP) algorithm, further fine-tuned by a dense neural network (DNN), achieving a remarkable 98.71% accuracy in pinpointing websites that violate copyright.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"579 ","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138983126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Learning Game-Based Approach to Task-Dependent Edge Resource Allocation 基于学习游戏的任务边缘资源分配方法
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-07 DOI: 10.3390/fi15120395
Zuopeng Li, Hengshuai Ju, Zepeng Ren
The existing research on dependent task offloading and resource allocation assumes that edge servers can provide computational and communication resources free of charge. This paper proposes a two-stage resource allocation method to address this issue. In the first stage, users incentivize edge servers to provide resources. We formulate the incentive problem in this stage as a multivariate Stackelberg game, which takes into account both computational and communication resources. In addition, we also analyze the uniqueness of the Stackelberg equilibrium under information sharing conditions. Considering the privacy issues of the participants, the research is extended to scenarios without information sharing, where the multivariable game problem is modeled as a partially observable Markov decision process (POMDP). In order to obtain the optimal incentive decision in this scenario, a reinforcement learning algorithm based on the learning game is designed. In the second stage, we propose a greedy-based deep reinforcement learning algorithm that is aimed at minimizing task execution time by optimizing resource and task allocation strategies. Finally, the simulation results demonstrate that the algorithm designed for non-information sharing scenarios can effectively approximate the theoretical Stackelberg equilibrium, and its performance is found to be better than that of the other three benchmark methods. After the allocation of resources and sub-tasks by the greedy-based deep reinforcement learning algorithm, the execution delay of the dependent task is significantly lower than that in local processing.
现有的相关任务卸载和资源分配研究假设边缘服务器可以免费提供计算和通信资源。本文提出了一种两阶段资源分配方法来解决这一问题。在第一阶段,用户激励边缘服务器提供资源。我们将这一阶段的激励问题表述为考虑计算资源和通信资源的多元Stackelberg博弈。此外,我们还分析了信息共享条件下Stackelberg均衡的唯一性。考虑到参与者的隐私问题,将研究扩展到没有信息共享的情况下,将多变量博弈问题建模为部分可观察的马尔可夫决策过程(POMDP)。为了在这种情况下获得最优激励决策,设计了一种基于学习博弈的强化学习算法。在第二阶段,我们提出了一种基于贪婪的深度强化学习算法,旨在通过优化资源和任务分配策略来最小化任务执行时间。最后,仿真结果表明,针对非信息共享场景设计的算法能够有效逼近理论Stackelberg均衡,且性能优于其他三种基准方法。通过基于贪婪的深度强化学习算法分配资源和子任务后,依赖任务的执行延迟明显低于局部处理。
{"title":"A Learning Game-Based Approach to Task-Dependent Edge Resource Allocation","authors":"Zuopeng Li, Hengshuai Ju, Zepeng Ren","doi":"10.3390/fi15120395","DOIUrl":"https://doi.org/10.3390/fi15120395","url":null,"abstract":"The existing research on dependent task offloading and resource allocation assumes that edge servers can provide computational and communication resources free of charge. This paper proposes a two-stage resource allocation method to address this issue. In the first stage, users incentivize edge servers to provide resources. We formulate the incentive problem in this stage as a multivariate Stackelberg game, which takes into account both computational and communication resources. In addition, we also analyze the uniqueness of the Stackelberg equilibrium under information sharing conditions. Considering the privacy issues of the participants, the research is extended to scenarios without information sharing, where the multivariable game problem is modeled as a partially observable Markov decision process (POMDP). In order to obtain the optimal incentive decision in this scenario, a reinforcement learning algorithm based on the learning game is designed. In the second stage, we propose a greedy-based deep reinforcement learning algorithm that is aimed at minimizing task execution time by optimizing resource and task allocation strategies. Finally, the simulation results demonstrate that the algorithm designed for non-information sharing scenarios can effectively approximate the theoretical Stackelberg equilibrium, and its performance is found to be better than that of the other three benchmark methods. After the allocation of resources and sub-tasks by the greedy-based deep reinforcement learning algorithm, the execution delay of the dependent task is significantly lower than that in local processing.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"67 6","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138590883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Envisioning Digital Practices in the Metaverse: A Methodological Perspective 设想元宇宙中的数字实践:方法论视角
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-06 DOI: 10.3390/fi15120394
Luca Sabatucci, A. Augello, Giuseppe Caggianese, Luigi Gallo
Researchers are exploring methods that exploit digital twins as all-purpose abstractions for sophisticated modelling and simulation, bringing elements of the real world into the virtual realm. Digital twins are essential elements of the digital transformation of society, which mostly benefit manufacturing, smart cities, healthcare contexts, and in general systems that include humans in the loop. As the metaverse concept continues to evolve, the line separating the virtual and the real will progressively fade away. Considering the metaverse’s goal to emulate our social reality, it becomes essential to examine the aspects that characterise real-world interaction practices and explicitly model both physical and social contexts. While the unfolding metaverse may reshape these practices in distinct ways from their real-world counterparts, our position is that it is essential to incorporate social theories into the modelling processes of digital twins within the metaverse. In this work, we discuss our perspective by introducing a digital practice model inspired by the theory of social practice. We illustrate this model by exploiting the scenario of a virtual grocery shop designed to help older adults reduce their social isolation.
研究人员正在探索利用数字孪生作为复杂建模和仿真的通用抽象的方法,将现实世界的元素带入虚拟领域。数字孪生是社会数字化转型的基本要素,主要受益于制造业、智慧城市、医疗保健环境以及包括人类在内的一般系统。随着虚拟世界概念的不断发展,分隔虚拟和现实的界线将逐渐消失。考虑到虚拟世界的目标是模拟我们的社会现实,有必要检查表征现实世界互动实践的各个方面,并明确地为物理和社会背景建模。虽然正在展开的虚拟世界可能会以不同于现实世界的方式重塑这些实践,但我们的立场是,将社会理论纳入虚拟世界中数字双胞胎的建模过程是至关重要的。在这项工作中,我们通过引入受社会实践理论启发的数字实践模型来讨论我们的观点。我们利用一个虚拟杂货店的场景来说明这个模型,这个虚拟杂货店旨在帮助老年人减少他们的社会孤立。
{"title":"Envisioning Digital Practices in the Metaverse: A Methodological Perspective","authors":"Luca Sabatucci, A. Augello, Giuseppe Caggianese, Luigi Gallo","doi":"10.3390/fi15120394","DOIUrl":"https://doi.org/10.3390/fi15120394","url":null,"abstract":"Researchers are exploring methods that exploit digital twins as all-purpose abstractions for sophisticated modelling and simulation, bringing elements of the real world into the virtual realm. Digital twins are essential elements of the digital transformation of society, which mostly benefit manufacturing, smart cities, healthcare contexts, and in general systems that include humans in the loop. As the metaverse concept continues to evolve, the line separating the virtual and the real will progressively fade away. Considering the metaverse’s goal to emulate our social reality, it becomes essential to examine the aspects that characterise real-world interaction practices and explicitly model both physical and social contexts. While the unfolding metaverse may reshape these practices in distinct ways from their real-world counterparts, our position is that it is essential to incorporate social theories into the modelling processes of digital twins within the metaverse. In this work, we discuss our perspective by introducing a digital practice model inspired by the theory of social practice. We illustrate this model by exploiting the scenario of a virtual grocery shop designed to help older adults reduce their social isolation.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"15 9","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138594289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1