首页 > 最新文献

Future Internet最新文献

英文 中文
Federated Adversarial Training Strategies for Achieving Privacy and Security in Sustainable Smart City Applications 在可持续智能城市应用中实现隐私和安全的联合对抗训练策略
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-20 DOI: 10.3390/fi15110371
Sapdo Utomo, Adarsh Rouniyar, Hsiu-Chun Hsu, Pao-Ann Hsiung
Smart city applications that request sensitive user information necessitate a comprehensive data privacy solution. Federated learning (FL), also known as privacy by design, is a new paradigm in machine learning (ML). However, FL models are susceptible to adversarial attacks, similar to other AI models. In this paper, we propose federated adversarial training (FAT) strategies to generate robust global models that are resistant to adversarial attacks. We apply two adversarial attack methods, projected gradient descent (PGD) and the fast gradient sign method (FGSM), to our air pollution dataset to generate adversarial samples. We then evaluate the effectiveness of our FAT strategies in defending against these attacks. Our experiments show that FGSM-based adversarial attacks have a negligible impact on the accuracy of global models, while PGD-based attacks are more effective. However, we also show that our FAT strategies can make global models robust enough to withstand even PGD-based attacks. For example, the accuracy of our FAT-PGD and FL-mixed-PGD models is 81.13% and 82.60%, respectively, compared to 91.34% for the baseline FL model. This represents a reduction in accuracy of 10%, but this could be potentially mitigated by using a more complex and larger model. Our results demonstrate that FAT can enhance the security and privacy of sustainable smart city applications. We also show that it is possible to train robust global models from modest datasets per client, which challenges the conventional wisdom that adversarial training requires massive datasets.
智能城市应用需要用户的敏感信息,这就需要一个全面的数据隐私解决方案。联合学习(FL),也称为设计隐私,是机器学习(ML)的一种新模式。然而,FL 模型与其他人工智能模型类似,容易受到恶意攻击。在本文中,我们提出了联合对抗训练(FAT)策略,以生成可抵御对抗攻击的稳健全局模型。我们将两种对抗攻击方法,即投射梯度下降法(PGD)和快速梯度符号法(FGSM)应用于我们的空气污染数据集,以生成对抗样本。然后,我们评估了 FAT 策略在防御这些攻击方面的有效性。我们的实验表明,基于 FGSM 的对抗攻击对全局模型的准确性影响微乎其微,而基于 PGD 的攻击则更为有效。不过,我们也表明,我们的 FAT 策略可以使全局模型足够强大,甚至可以抵御基于 PGD 的攻击。例如,我们的 FAT-PGD 和 FL-mixed-PGD 模型的准确率分别为 81.13% 和 82.60%,而基线 FL 模型的准确率为 91.34%。这意味着准确率降低了 10%,但使用更复杂、更大型的模型可能会缓解这一问题。我们的研究结果表明,FAT 可以提高可持续智能城市应用的安全性和隐私性。我们还表明,可以通过每个客户端的少量数据集训练出稳健的全局模型,这对对抗训练需要大量数据集的传统观点提出了挑战。
{"title":"Federated Adversarial Training Strategies for Achieving Privacy and Security in Sustainable Smart City Applications","authors":"Sapdo Utomo, Adarsh Rouniyar, Hsiu-Chun Hsu, Pao-Ann Hsiung","doi":"10.3390/fi15110371","DOIUrl":"https://doi.org/10.3390/fi15110371","url":null,"abstract":"Smart city applications that request sensitive user information necessitate a comprehensive data privacy solution. Federated learning (FL), also known as privacy by design, is a new paradigm in machine learning (ML). However, FL models are susceptible to adversarial attacks, similar to other AI models. In this paper, we propose federated adversarial training (FAT) strategies to generate robust global models that are resistant to adversarial attacks. We apply two adversarial attack methods, projected gradient descent (PGD) and the fast gradient sign method (FGSM), to our air pollution dataset to generate adversarial samples. We then evaluate the effectiveness of our FAT strategies in defending against these attacks. Our experiments show that FGSM-based adversarial attacks have a negligible impact on the accuracy of global models, while PGD-based attacks are more effective. However, we also show that our FAT strategies can make global models robust enough to withstand even PGD-based attacks. For example, the accuracy of our FAT-PGD and FL-mixed-PGD models is 81.13% and 82.60%, respectively, compared to 91.34% for the baseline FL model. This represents a reduction in accuracy of 10%, but this could be potentially mitigated by using a more complex and larger model. Our results demonstrate that FAT can enhance the security and privacy of sustainable smart city applications. We also show that it is possible to train robust global models from modest datasets per client, which challenges the conventional wisdom that adversarial training requires massive datasets.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"176 5","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139257197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge AI for Early Detection of Chronic Diseases and the Spread of Infectious Diseases: Opportunities, Challenges, and Future Directions 用于早期检测慢性病和传染病传播的边缘人工智能:机遇、挑战与未来方向
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-18 DOI: 10.3390/fi15110370
E. Badidi
Edge AI, an interdisciplinary technology that enables distributed intelligence with edge devices, is quickly becoming a critical component in early health prediction. Edge AI encompasses data analytics and artificial intelligence (AI) using machine learning, deep learning, and federated learning models deployed and executed at the edge of the network, far from centralized data centers. AI enables the careful analysis of large datasets derived from multiple sources, including electronic health records, wearable devices, and demographic information, making it possible to identify intricate patterns and predict a person’s future health. Federated learning, a novel approach in AI, further enhances this prediction by enabling collaborative training of AI models on distributed edge devices while maintaining privacy. Using edge computing, data can be processed and analyzed locally, reducing latency and enabling instant decision making. This article reviews the role of Edge AI in early health prediction and highlights its potential to improve public health. Topics covered include the use of AI algorithms for early detection of chronic diseases such as diabetes and cancer and the use of edge computing in wearable devices to detect the spread of infectious diseases. In addition to discussing the challenges and limitations of Edge AI in early health prediction, this article emphasizes future research directions to address these concerns and the integration with existing healthcare systems and explore the full potential of these technologies in improving public health.
边缘人工智能是一种利用边缘设备实现分布式智能的跨学科技术,正迅速成为早期健康预测的关键组成部分。边缘人工智能包括数据分析和人工智能(AI),使用机器学习、深度学习和联合学习模型,在远离集中数据中心的网络边缘部署和执行。通过人工智能,可以对电子健康记录、可穿戴设备和人口信息等多种来源的大型数据集进行仔细分析,从而识别复杂的模式并预测个人的未来健康状况。联合学习是人工智能领域的一种新方法,通过在分布式边缘设备上对人工智能模型进行协作训练,进一步增强了这种预测能力,同时还能维护隐私。利用边缘计算,可以在本地处理和分析数据,减少延迟并实现即时决策。本文回顾了边缘人工智能在早期健康预测中的作用,并强调了其改善公共卫生的潜力。涉及的主题包括使用人工智能算法早期检测糖尿病和癌症等慢性疾病,以及在可穿戴设备中使用边缘计算检测传染病的传播。除了讨论边缘人工智能在早期健康预测方面的挑战和局限性外,本文还强调了未来的研究方向,以解决这些问题,并与现有的医疗保健系统进行整合,充分挖掘这些技术在改善公共健康方面的潜力。
{"title":"Edge AI for Early Detection of Chronic Diseases and the Spread of Infectious Diseases: Opportunities, Challenges, and Future Directions","authors":"E. Badidi","doi":"10.3390/fi15110370","DOIUrl":"https://doi.org/10.3390/fi15110370","url":null,"abstract":"Edge AI, an interdisciplinary technology that enables distributed intelligence with edge devices, is quickly becoming a critical component in early health prediction. Edge AI encompasses data analytics and artificial intelligence (AI) using machine learning, deep learning, and federated learning models deployed and executed at the edge of the network, far from centralized data centers. AI enables the careful analysis of large datasets derived from multiple sources, including electronic health records, wearable devices, and demographic information, making it possible to identify intricate patterns and predict a person’s future health. Federated learning, a novel approach in AI, further enhances this prediction by enabling collaborative training of AI models on distributed edge devices while maintaining privacy. Using edge computing, data can be processed and analyzed locally, reducing latency and enabling instant decision making. This article reviews the role of Edge AI in early health prediction and highlights its potential to improve public health. Topics covered include the use of AI algorithms for early detection of chronic diseases such as diabetes and cancer and the use of edge computing in wearable devices to detect the spread of infectious diseases. In addition to discussing the challenges and limitations of Edge AI in early health prediction, this article emphasizes future research directions to address these concerns and the integration with existing healthcare systems and explore the full potential of these technologies in improving public health.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"53 1","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139262414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maximizing UAV Coverage in Maritime Wireless Networks: A Multiagent Reinforcement Learning Approach 最大化海上无线网络中的无人机覆盖范围:多代理强化学习方法
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-16 DOI: 10.3390/fi15110369
Qianqian Wu, Qiang Liu, Zefan Wu, Jiye Zhang
In the field of ocean data monitoring, collaborative control and path planning of unmanned aerial vehicles (UAVs) are essential for improving data collection efficiency and quality. In this study, we focus on how to utilize multiple UAVs to efficiently cover the target area in ocean data monitoring tasks. First, we propose a multiagent deep reinforcement learning (DRL)-based path-planning method for multiple UAVs to perform efficient coverage tasks in a target area in the field of ocean data monitoring. Additionally, the traditional Multi-Agent Twin Delayed Deep Deterministic policy gradient (MATD3) algorithm only considers the current state of the agents, leading to poor performance in path planning. To address this issue, we introduce an improved MATD3 algorithm with the integration of a stacked long short-term memory (S-LSTM) network to incorporate the historical interaction information and environmental changes among agents. Finally, the experimental results demonstrate that the proposed MATD3-Stacked_LSTM algorithm can effectively improve the efficiency and practicality of UAV path planning by achieving a high coverage rate of the target area and reducing the redundant coverage rate among UAVs compared with two other advanced DRL algorithms.
在海洋数据监测领域,无人飞行器(UAV)的协同控制和路径规划对于提高数据收集效率和质量至关重要。在本研究中,我们重点关注如何在海洋数据监测任务中利用多架无人飞行器高效覆盖目标区域。首先,我们提出了一种基于多代理深度强化学习(DRL)的路径规划方法,用于多架无人机在海洋数据监测领域的目标区域执行高效覆盖任务。此外,传统的多代理双延迟深度确定性策略梯度(MATD3)算法只考虑代理的当前状态,导致路径规划性能不佳。为了解决这个问题,我们引入了一种改进的 MATD3 算法,该算法集成了堆叠式长短期记忆(S-LSTM)网络,以纳入代理之间的历史交互信息和环境变化。最后,实验结果表明,与其他两种先进的 DRL 算法相比,所提出的 MATD3-Stacked_LSTM 算法能够实现对目标区域的高覆盖率,并降低无人机之间的冗余覆盖率,从而有效提高无人机路径规划的效率和实用性。
{"title":"Maximizing UAV Coverage in Maritime Wireless Networks: A Multiagent Reinforcement Learning Approach","authors":"Qianqian Wu, Qiang Liu, Zefan Wu, Jiye Zhang","doi":"10.3390/fi15110369","DOIUrl":"https://doi.org/10.3390/fi15110369","url":null,"abstract":"In the field of ocean data monitoring, collaborative control and path planning of unmanned aerial vehicles (UAVs) are essential for improving data collection efficiency and quality. In this study, we focus on how to utilize multiple UAVs to efficiently cover the target area in ocean data monitoring tasks. First, we propose a multiagent deep reinforcement learning (DRL)-based path-planning method for multiple UAVs to perform efficient coverage tasks in a target area in the field of ocean data monitoring. Additionally, the traditional Multi-Agent Twin Delayed Deep Deterministic policy gradient (MATD3) algorithm only considers the current state of the agents, leading to poor performance in path planning. To address this issue, we introduce an improved MATD3 algorithm with the integration of a stacked long short-term memory (S-LSTM) network to incorporate the historical interaction information and environmental changes among agents. Finally, the experimental results demonstrate that the proposed MATD3-Stacked_LSTM algorithm can effectively improve the efficiency and practicality of UAV path planning by achieving a high coverage rate of the target area and reducing the redundant coverage rate among UAVs compared with two other advanced DRL algorithms.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"10 4","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139269798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GRAPH4: A Security Monitoring Architecture Based on Data Plane Anomaly Detection Metrics Calculated over Attack Graphs GRAPH4:基于攻击图计算的数据平面异常检测指标的安全监控架构
IF 3.4 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-15 DOI: 10.3390/fi15110368
Giacomo Gori, Lorenzo Rinieri, Amir Al Sadi, A. Melis, Franco Callegati, Marco Prandini
The correct and efficient measurement of security properties is key to the deployment of effective cyberspace protection strategies. In this work, we propose GRAPH4, which is a system that combines different security metrics to design an attack detection approach that leverages the advantages of modern network architectures. GRAPH4 makes use of attack graphs that are generated by the control plane to extract a view of the network components requiring monitoring, which is based on the specific attack that must be detected and on the knowledge of the complete network layout. It enables an efficient distribution of security metrics tasks between the control plane and the data plane. The attack graph is translated into network rules that are subsequently installed in programmable nodes in order to enable alerting and detecting network anomalies at a line rate. By leveraging data plane programmability and security metric scores, GRAPH4 enables timely responses to unforeseen conditions while optimizing resource allocation and enhancing proactive defense. This paper details the architecture of GRAPH4, and it provides an evaluation of the performance gains it can achieve.
正确有效地衡量安全属性是部署有效网络空间保护战略的关键。在这项工作中,我们提出了 GRAPH4,这是一个结合不同安全指标的系统,旨在设计一种利用现代网络架构优势的攻击检测方法。GRAPH4 利用控制平面生成的攻击图来提取需要监控的网络组件视图,该视图基于必须检测的特定攻击和对完整网络布局的了解。它能在控制平面和数据平面之间有效分配安全度量任务。攻击图被转化为网络规则,这些规则随后被安装到可编程节点中,以便以线性速率发出警报和检测网络异常。通过利用数据平面的可编程性和安全指标得分,GRAPH4 能够及时应对突发状况,同时优化资源分配并增强主动防御能力。本文详细介绍了 GRAPH4 的架构,并对其可实现的性能提升进行了评估。
{"title":"GRAPH4: A Security Monitoring Architecture Based on Data Plane Anomaly Detection Metrics Calculated over Attack Graphs","authors":"Giacomo Gori, Lorenzo Rinieri, Amir Al Sadi, A. Melis, Franco Callegati, Marco Prandini","doi":"10.3390/fi15110368","DOIUrl":"https://doi.org/10.3390/fi15110368","url":null,"abstract":"The correct and efficient measurement of security properties is key to the deployment of effective cyberspace protection strategies. In this work, we propose GRAPH4, which is a system that combines different security metrics to design an attack detection approach that leverages the advantages of modern network architectures. GRAPH4 makes use of attack graphs that are generated by the control plane to extract a view of the network components requiring monitoring, which is based on the specific attack that must be detected and on the knowledge of the complete network layout. It enables an efficient distribution of security metrics tasks between the control plane and the data plane. The attack graph is translated into network rules that are subsequently installed in programmable nodes in order to enable alerting and detecting network anomalies at a line rate. By leveraging data plane programmability and security metric scores, GRAPH4 enables timely responses to unforeseen conditions while optimizing resource allocation and enhancing proactive defense. This paper details the architecture of GRAPH4, and it provides an evaluation of the performance gains it can achieve.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"81 6","pages":""},"PeriodicalIF":3.4,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139274725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transforming Educational Institutions: Harnessing the Power of Internet of Things, Cloud, and Fog Computing 转型教育机构:利用物联网、云和雾计算的力量
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-13 DOI: 10.3390/fi15110367
Afzal Badshah, Ghani Ur Rehman, Haleem Farman, Anwar Ghani, Shahid Sultan, Muhammad Zubair, Moustafa M. Nasralla
The Internet of Things (IoT), cloud, and fog computing are now a reality and have become the vision of the smart world. Self-directed learning approaches, their tools, and smart spaces are transforming traditional institutions into smart institutions. This transition has a positive impact on learner engagement, motivation, attendance, and advanced learning outcomes. In developing countries, there are many barriers to quality education, such as inadequate implementation of standard operating procedures, lack of involvement from learners and parents, and lack of transparent performance measurement for both institutions and students. These issues need to be addressed to ensure further growth and improvement. This study explored the use of smart technologies (IoT, fog, and cloud computing) to address challenges in student learning and administrative tasks. A novel framework (a five-element smart institution framework) is proposed to connect administrators, teachers, parents, and students using smart technologies to improve attendance, pedagogy, and evaluation. The results showed significant increases in student attendance and homework progress, along with improvements in annual results, student discipline, and teacher/parent engagement.
物联网(IoT)、云和雾计算现在已经成为现实,并成为智能世界的愿景。自主学习方法、工具和智能空间正在将传统机构转变为智能机构。这种转变对学习者的参与、动机、出勤率和高级学习成果都有积极的影响。在发展中国家,高质量教育存在许多障碍,例如标准操作程序的实施不足,学习者和家长缺乏参与,以及对机构和学生缺乏透明的绩效衡量。这些问题需要得到解决,以确保进一步的增长和改进。本研究探讨了智能技术(物联网、雾和云计算)的使用,以解决学生学习和管理任务中的挑战。提出了一个新的框架(五要素智能机构框架),通过智能技术将管理人员、教师、家长和学生联系起来,以提高出勤率、教学方法和评估。结果显示,学生出勤率和作业进度显著提高,年度成绩、学生纪律和教师/家长参与度也有所改善。
{"title":"Transforming Educational Institutions: Harnessing the Power of Internet of Things, Cloud, and Fog Computing","authors":"Afzal Badshah, Ghani Ur Rehman, Haleem Farman, Anwar Ghani, Shahid Sultan, Muhammad Zubair, Moustafa M. Nasralla","doi":"10.3390/fi15110367","DOIUrl":"https://doi.org/10.3390/fi15110367","url":null,"abstract":"The Internet of Things (IoT), cloud, and fog computing are now a reality and have become the vision of the smart world. Self-directed learning approaches, their tools, and smart spaces are transforming traditional institutions into smart institutions. This transition has a positive impact on learner engagement, motivation, attendance, and advanced learning outcomes. In developing countries, there are many barriers to quality education, such as inadequate implementation of standard operating procedures, lack of involvement from learners and parents, and lack of transparent performance measurement for both institutions and students. These issues need to be addressed to ensure further growth and improvement. This study explored the use of smart technologies (IoT, fog, and cloud computing) to address challenges in student learning and administrative tasks. A novel framework (a five-element smart institution framework) is proposed to connect administrators, teachers, parents, and students using smart technologies to improve attendance, pedagogy, and evaluation. The results showed significant increases in student attendance and homework progress, along with improvements in annual results, student discipline, and teacher/parent engagement.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"57 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136347046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design Considerations and Performance Evaluation of Gossip Routing in LoRa-Based Linear Networks 基于lora的线性网络中八卦路由的设计考虑与性能评估
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-11 DOI: 10.3390/fi15110366
Rao Muzamal Liaqat, Philip Branch, Jason But
Linear networks (sometimes called chain-type networks) occur frequently in Internet of Things (IoT) applications, where sensors or actuators are deployed along pipelines, roads, railways, mines, and international borders. LoRa, short for Long Range, is an increasingly important technology for the IoT with great potential for linear networking. Despite its potential, limited research has explored LoRa’s implementation in such networks. In this paper, we addressed two important issues related to LoRa linear networks. The first is contention, when multiple nodes attempt to access a shared channel. Although originally designed to deal with interference, LoRa’s technique of synchronisation with a transmission node permits a novel approach to contention, which we explored. The second issue revolves around routing, where linear networks permit simpler strategies, in contrast to the common routing complexities of mesh networks. We present gossip routing as a very lightweight approach to routing. All our evaluations were carried out using real equipment by developing real networks. We constructed networks of up to three hops in length and up to three nodes in width. We carried out experiments looking at contention and routing. We demonstrate using the novel approach that we could achieve up to 98% throughput. We compared its performance considering collocated scenarios that achieved 84% and 89% throughputby using relay widths of two and three at each hop, respectively. Lastly, we demonstrate the effectiveness of gossip routing by using various transmission probabilities. We noticed high performance up to 98% throughputat Tprob = 0.90 and Tprob = 0.80 by employing two and three active relay nodes, respectively. The experimental result showed that, at Tprob = 0.40, it achieved an average performance of 62.8% and 73.77% by using two and three active relay nodes, respectively. We concluded that LoRa is an excellent technology for Internet of Things applications where sensors and actuators are deployed in an approximately linear fashion.
线性网络(有时称为链式网络)经常出现在物联网(IoT)应用中,其中传感器或执行器部署在管道,公路,铁路,矿山和国际边界。LoRa (Long Range的缩写)是一项越来越重要的物联网技术,在线性网络方面具有巨大的潜力。尽管LoRa具有潜力,但探索LoRa在此类网络中的实现的研究有限。在本文中,我们讨论了与LoRa线性网络相关的两个重要问题。第一个是争用,当多个节点试图访问共享通道时。尽管LoRa的最初设计是为了处理干扰,但它与传输节点的同步技术允许一种新的争用方法,我们对此进行了探讨。第二个问题围绕路由展开,与网状网络的常见路由复杂性相比,线性网络允许更简单的策略。我们将八卦路由作为一种非常轻量级的路由方法。我们所有的评估都是通过开发真实的网络,使用真实的设备进行的。我们构建了长度最多为三跳、宽度最多为三个节点的网络。我们对争用和路由进行了实验。我们演示了使用这种新方法可以实现高达98%的吞吐量。我们比较了它的性能,考虑了在每跳分别使用2和3个中继宽度实现84%和89%吞吐量的并置场景。最后,我们用不同的传输概率证明了八卦路由的有效性。我们注意到,通过分别使用两个和三个活动中继节点,在Tprob = 0.90和Tprob = 0.80的情况下,性能高达98%。实验结果表明,在Tprob = 0.40时,采用2个有源中继节点和3个有源中继节点的平均性能分别为62.8%和73.77%。我们的结论是,LoRa是物联网应用的一项优秀技术,传感器和执行器以近似线性的方式部署。
{"title":"Design Considerations and Performance Evaluation of Gossip Routing in LoRa-Based Linear Networks","authors":"Rao Muzamal Liaqat, Philip Branch, Jason But","doi":"10.3390/fi15110366","DOIUrl":"https://doi.org/10.3390/fi15110366","url":null,"abstract":"Linear networks (sometimes called chain-type networks) occur frequently in Internet of Things (IoT) applications, where sensors or actuators are deployed along pipelines, roads, railways, mines, and international borders. LoRa, short for Long Range, is an increasingly important technology for the IoT with great potential for linear networking. Despite its potential, limited research has explored LoRa’s implementation in such networks. In this paper, we addressed two important issues related to LoRa linear networks. The first is contention, when multiple nodes attempt to access a shared channel. Although originally designed to deal with interference, LoRa’s technique of synchronisation with a transmission node permits a novel approach to contention, which we explored. The second issue revolves around routing, where linear networks permit simpler strategies, in contrast to the common routing complexities of mesh networks. We present gossip routing as a very lightweight approach to routing. All our evaluations were carried out using real equipment by developing real networks. We constructed networks of up to three hops in length and up to three nodes in width. We carried out experiments looking at contention and routing. We demonstrate using the novel approach that we could achieve up to 98% throughput. We compared its performance considering collocated scenarios that achieved 84% and 89% throughputby using relay widths of two and three at each hop, respectively. Lastly, we demonstrate the effectiveness of gossip routing by using various transmission probabilities. We noticed high performance up to 98% throughputat Tprob = 0.90 and Tprob = 0.80 by employing two and three active relay nodes, respectively. The experimental result showed that, at Tprob = 0.40, it achieved an average performance of 62.8% and 73.77% by using two and three active relay nodes, respectively. We concluded that LoRa is an excellent technology for Internet of Things applications where sensors and actuators are deployed in an approximately linear fashion.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"31 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135086366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing Interactive Web-Based Systems Using Behavioral Measurement Techniques 使用行为测量技术评估交互式网络系统
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-11 DOI: 10.3390/fi15110365
Thanaa Saad AlSalem, Majed Aadi AlShamari
Nowadays, e-commerce websites have become part of people’s daily lives; therefore, it has become necessary to seek help in assessing and improving the usability of the services of e-commerce websites. Essentially, usability studies offer significant information about users’ assessment and perceptions of satisfaction, effectiveness, and efficiency of online services. This research investigated the usability of two e-commerce web-sites in Saudi Arabia and compared the effectiveness of different behavioral measurement techniques, such as heuristic evaluation, usability testing, and eye-tracking. In particular, this research selected the Extra and Jarir e-commerce websites in Saudi Arabia based on a combined approach of criteria and ranking. This research followed an experimental approach in which both qualitative and quantitative approaches were employed to collect and analyze the data. Each of the behavioral measurement techniques identified usability issues ranging from cosmetic to catastrophic issues. It is worth mentioning that the heuristic evaluation by experts provided both the majority of the issues and identified the most severe usability issues compared to the number of issues identified by both usability testing and eye-tracking combined. Usability testing provided fewer problems, most of which had already been identified by the experts. Eye-tracking provided critical information regarding the page design and element placements and revealed certain user behavior patterns that indicated certain usability problems. Overall, the research findings appeared useful to user experience (UX) and user interface (UI) designers to consider the provided recommendations to enhance the usability of e-commerce websites.
如今,电子商务网站已经成为人们日常生活的一部分;因此,寻求帮助来评估和提高电子商务网站服务的可用性已成为必要。本质上,可用性研究提供了关于用户对在线服务的满意度、有效性和效率的评估和看法的重要信息。本研究调查了沙特阿拉伯的两个电子商务网站的可用性,并比较了不同行为测量技术的有效性,如启发式评估、可用性测试和眼球追踪。特别地,本研究根据标准和排名的综合方法选择了沙特阿拉伯的Extra和Jarir电子商务网站。本研究采用实验方法,采用定性和定量方法收集和分析数据。每种行为度量技术都确定了可用性问题,从表面问题到灾难性问题。值得一提的是,与可用性测试和眼动追踪联合发现的问题数量相比,专家的启发式评估提供了大多数问题,并确定了最严重的可用性问题。可用性测试提供的问题较少,其中大多数问题已经被专家发现。眼球追踪提供了关于页面设计和元素放置的关键信息,并揭示了某些用户行为模式,这些模式表明某些可用性问题。总体而言,研究结果对用户体验和用户界面设计师有用,有助他们考虑所提供的建议,以提高电子商务网站的可用性。
{"title":"Assessing Interactive Web-Based Systems Using Behavioral Measurement Techniques","authors":"Thanaa Saad AlSalem, Majed Aadi AlShamari","doi":"10.3390/fi15110365","DOIUrl":"https://doi.org/10.3390/fi15110365","url":null,"abstract":"Nowadays, e-commerce websites have become part of people’s daily lives; therefore, it has become necessary to seek help in assessing and improving the usability of the services of e-commerce websites. Essentially, usability studies offer significant information about users’ assessment and perceptions of satisfaction, effectiveness, and efficiency of online services. This research investigated the usability of two e-commerce web-sites in Saudi Arabia and compared the effectiveness of different behavioral measurement techniques, such as heuristic evaluation, usability testing, and eye-tracking. In particular, this research selected the Extra and Jarir e-commerce websites in Saudi Arabia based on a combined approach of criteria and ranking. This research followed an experimental approach in which both qualitative and quantitative approaches were employed to collect and analyze the data. Each of the behavioral measurement techniques identified usability issues ranging from cosmetic to catastrophic issues. It is worth mentioning that the heuristic evaluation by experts provided both the majority of the issues and identified the most severe usability issues compared to the number of issues identified by both usability testing and eye-tracking combined. Usability testing provided fewer problems, most of which had already been identified by the experts. Eye-tracking provided critical information regarding the page design and element placements and revealed certain user behavior patterns that indicated certain usability problems. Overall, the research findings appeared useful to user experience (UX) and user interface (UI) designers to consider the provided recommendations to enhance the usability of e-commerce websites.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"31 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135086361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment Analysis of Chinese Product Reviews Based on Fusion of DUAL-Channel BiLSTM and Self-Attention 基于双通道BiLSTM和自关注融合的中文产品评论情感分析
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-10 DOI: 10.3390/fi15110364
Ye Yuan, Wang Wang, Guangze Wen, Zikun Zheng, Zhemin Zhuang
Product reviews provide crucial information for both consumers and businesses, offering insights needed before purchasing a product or service. However, existing sentiment analysis methods, especially for Chinese language, struggle to effectively capture contextual information due to the complex semantics, multiple sentiment polarities, and long-term dependencies between words. In this paper, we propose a sentiment classification method based on the BiLSTM algorithm to address these challenges in natural language processing. Self-Attention-CNN BiLSTM (SAC-BiLSTM) leverages dual channels to extract features from both character-level embeddings and word-level embeddings. It combines BiLSTM and Self-Attention mechanisms for feature extraction and weight allocation, aiming to overcome the limitations in mining contextual information. Experiments were conducted on the onlineshopping10cats dataset, which is a standard corpus of e-commerce shopping reviews available in the ChineseNlpCorpus 2018. The experimental results demonstrate the effectiveness of our proposed algorithm, with Recall, Precision, and F1 scores reaching 0.9409, 0.9369, and 0.9404, respectively.
产品评论为消费者和企业提供了至关重要的信息,在购买产品或服务之前提供了所需的见解。然而,现有的情感分析方法,特别是针对汉语的情感分析方法,由于语义复杂、情感极性多样以及词与词之间的长期依赖关系,难以有效地捕获上下文信息。在本文中,我们提出了一种基于BiLSTM算法的情感分类方法来解决自然语言处理中的这些挑战。自注意- cnn BiLSTM (SAC-BiLSTM)利用双通道从字符级嵌入和词级嵌入中提取特征。它结合了BiLSTM和自关注机制进行特征提取和权重分配,旨在克服上下文信息挖掘的局限性。实验是在onlineshopping10cats数据集上进行的,该数据集是chinese enlpcorpus 2018中可用的电子商务购物评论的标准语料库。实验结果证明了本文算法的有效性,Recall、Precision和F1得分分别达到0.9409、0.9369和0.9404。
{"title":"Sentiment Analysis of Chinese Product Reviews Based on Fusion of DUAL-Channel BiLSTM and Self-Attention","authors":"Ye Yuan, Wang Wang, Guangze Wen, Zikun Zheng, Zhemin Zhuang","doi":"10.3390/fi15110364","DOIUrl":"https://doi.org/10.3390/fi15110364","url":null,"abstract":"Product reviews provide crucial information for both consumers and businesses, offering insights needed before purchasing a product or service. However, existing sentiment analysis methods, especially for Chinese language, struggle to effectively capture contextual information due to the complex semantics, multiple sentiment polarities, and long-term dependencies between words. In this paper, we propose a sentiment classification method based on the BiLSTM algorithm to address these challenges in natural language processing. Self-Attention-CNN BiLSTM (SAC-BiLSTM) leverages dual channels to extract features from both character-level embeddings and word-level embeddings. It combines BiLSTM and Self-Attention mechanisms for feature extraction and weight allocation, aiming to overcome the limitations in mining contextual information. Experiments were conducted on the onlineshopping10cats dataset, which is a standard corpus of e-commerce shopping reviews available in the ChineseNlpCorpus 2018. The experimental results demonstrate the effectiveness of our proposed algorithm, with Recall, Precision, and F1 scores reaching 0.9409, 0.9369, and 0.9404, respectively.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"121 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating Synthetic Resume Data with Large Language Models for Enhanced Job Description Classification 使用大型语言模型生成合成简历数据,以增强职位描述分类
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-09 DOI: 10.3390/fi15110363
Panagiotis Skondras, Panagiotis Zervas, Giannis Tzimas
In this article, we investigate the potential of synthetic resumes as a means for the rapid generation of training data and their effectiveness in data augmentation, especially in categories marked by sparse samples. The widespread implementation of machine learning algorithms in natural language processing (NLP) has notably streamlined the resume classification process, delivering time and cost efficiencies for hiring organizations. However, the performance of these algorithms depends on the abundance of training data. While selecting the right model architecture is essential, it is also crucial to ensure the availability of a robust, well-curated dataset. For many categories in the job market, data sparsity remains a challenge. To deal with this challenge, we employed the OpenAI API to generate both structured and unstructured resumes tailored to specific criteria. These synthetically generated resumes were cleaned, preprocessed and then utilized to train two distinct models: a transformer model (BERT) and a feedforward neural network (FFNN) that incorporated Universal Sentence Encoder 4 (USE4) embeddings. While both models were evaluated on the multiclass classification task of resumes, when trained on an augmented dataset containing 60 percent real data (from Indeed website) and 40 percent synthetic data from ChatGPT, the transformer model presented exceptional accuracy. The FFNN, albeit predictably, achieved lower accuracy. These findings highlight the value of augmented real-world data with ChatGPT-generated synthetic resumes, especially in the context of limited training data. The suitability of the BERT model for such classification tasks further reinforces this narrative.
在本文中,我们研究了合成简历作为快速生成训练数据的一种手段的潜力,以及它们在数据增强方面的有效性,特别是在稀疏样本标记的类别中。机器学习算法在自然语言处理(NLP)中的广泛应用,显著简化了简历分类过程,为招聘组织节省了时间和成本效率。然而,这些算法的性能取决于训练数据的丰富程度。虽然选择正确的模型架构是必不可少的,但确保一个健壮的、精心策划的数据集的可用性也是至关重要的。对于就业市场的许多类别来说,数据稀疏性仍然是一个挑战。为了应对这一挑战,我们使用OpenAI API根据特定标准生成结构化和非结构化简历。这些合成生成的简历被清洗、预处理,然后用于训练两个不同的模型:一个变压器模型(BERT)和一个前馈神经网络(FFNN),其中包含通用句子编码器4 (USE4)嵌入。虽然这两个模型都在简历的多类别分类任务上进行了评估,但当在包含60%真实数据(来自Indeed网站)和40%来自ChatGPT的合成数据的增强数据集上进行训练时,变压器模型表现出了出色的准确性。FFNN虽然可以预测,但准确率较低。这些发现突出了chatgpt生成的合成简历增强现实数据的价值,特别是在培训数据有限的情况下。BERT模型对此类分类任务的适用性进一步强化了这种叙述。
{"title":"Generating Synthetic Resume Data with Large Language Models for Enhanced Job Description Classification","authors":"Panagiotis Skondras, Panagiotis Zervas, Giannis Tzimas","doi":"10.3390/fi15110363","DOIUrl":"https://doi.org/10.3390/fi15110363","url":null,"abstract":"In this article, we investigate the potential of synthetic resumes as a means for the rapid generation of training data and their effectiveness in data augmentation, especially in categories marked by sparse samples. The widespread implementation of machine learning algorithms in natural language processing (NLP) has notably streamlined the resume classification process, delivering time and cost efficiencies for hiring organizations. However, the performance of these algorithms depends on the abundance of training data. While selecting the right model architecture is essential, it is also crucial to ensure the availability of a robust, well-curated dataset. For many categories in the job market, data sparsity remains a challenge. To deal with this challenge, we employed the OpenAI API to generate both structured and unstructured resumes tailored to specific criteria. These synthetically generated resumes were cleaned, preprocessed and then utilized to train two distinct models: a transformer model (BERT) and a feedforward neural network (FFNN) that incorporated Universal Sentence Encoder 4 (USE4) embeddings. While both models were evaluated on the multiclass classification task of resumes, when trained on an augmented dataset containing 60 percent real data (from Indeed website) and 40 percent synthetic data from ChatGPT, the transformer model presented exceptional accuracy. The FFNN, albeit predictably, achieved lower accuracy. These findings highlight the value of augmented real-world data with ChatGPT-generated synthetic resumes, especially in the context of limited training data. The suitability of the BERT model for such classification tasks further reinforces this narrative.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":" 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135241383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of Path Loss Models over Mid-Band and High-Band Channels for 5G Communication Networks: A Review 5G通信网络中高频段信道路径损耗模型性能研究综述
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-07 DOI: 10.3390/fi15110362
Farouq E. Shaibu, Elizabeth N. Onwuka, Nathaniel Salawu, Stephen S. Oyewobi, Karim Djouani, Adnan M. Abu-Mahfouz
The rapid development of 5G communication networks has ushered in a new era of high-speed, low-latency wireless connectivity, as well as the enabling of transformative technologies. However, a crucial aspect of ensuring reliable communication is the accurate modeling of path loss, as it directly impacts signal coverage, interference, and overall network efficiency. This review paper critically assesses the performance of path loss models in mid-band and high-band frequencies and examines their effectiveness in addressing the challenges of 5G deployment. In this paper, we first present the summary of the background, highlighting the increasing demand for high-quality wireless connectivity and the unique characteristics of mid-band (1–6 GHz) and high-band (>6 GHz) frequencies in the 5G spectrum. The methodology comprehensively reviews some of the existing path loss models, considering both empirical and machine learning approaches. We analyze the strengths and weaknesses of these models, considering factors such as urban and suburban environments and indoor scenarios. The results highlight the significant advancements in path loss modeling for mid-band and high-band 5G channels. In terms of prediction accuracy and computing effectiveness, machine learning models performed better than empirical models in both mid-band and high-band frequency spectra. As a result, they might be suggested as an alternative yet promising approach to predicting path loss in these bands. We consider the results of this review to be promising, as they provide network operators and researchers with valuable insights into the state-of-the-art path loss models for mid-band and high-band 5G channels. Future work suggests tuning an ensemble machine learning model to enhance a stable empirical model with multiple parameters to develop a hybrid path loss model for the mid-band frequency spectrum.
5G通信网络的快速发展,开启了高速低延迟无线连接的新时代,推动了变革性技术的实现。然而,确保可靠通信的一个关键方面是路径损耗的准确建模,因为它直接影响信号覆盖、干扰和整体网络效率。这篇综述论文批判性地评估了中频段和高频段路径损耗模型的性能,并检验了它们在应对5G部署挑战方面的有效性。在本文中,我们首先概述了背景,强调了对高质量无线连接的日益增长的需求以及5G频谱中频段(1 - 6ghz)和高频段(> 6ghz)频率的独特特性。该方法全面回顾了一些现有的路径损失模型,同时考虑了经验和机器学习方法。我们分析了这些模型的优缺点,考虑了城市和郊区环境以及室内场景等因素。研究结果突出了中频段和高频段5G信道路径损耗建模的重大进展。在预测精度和计算效率方面,机器学习模型在中频段和高频段频谱上都优于经验模型。因此,它们可能被认为是预测这些波段中路径损耗的一种有前途的替代方法。我们认为这篇综述的结果是有希望的,因为它们为网络运营商和研究人员提供了关于中频段和高频段5G信道最先进的路径损耗模型的宝贵见解。未来的工作建议调整集成机器学习模型,以增强具有多个参数的稳定经验模型,以开发中频频谱的混合路径损失模型。
{"title":"Performance of Path Loss Models over Mid-Band and High-Band Channels for 5G Communication Networks: A Review","authors":"Farouq E. Shaibu, Elizabeth N. Onwuka, Nathaniel Salawu, Stephen S. Oyewobi, Karim Djouani, Adnan M. Abu-Mahfouz","doi":"10.3390/fi15110362","DOIUrl":"https://doi.org/10.3390/fi15110362","url":null,"abstract":"The rapid development of 5G communication networks has ushered in a new era of high-speed, low-latency wireless connectivity, as well as the enabling of transformative technologies. However, a crucial aspect of ensuring reliable communication is the accurate modeling of path loss, as it directly impacts signal coverage, interference, and overall network efficiency. This review paper critically assesses the performance of path loss models in mid-band and high-band frequencies and examines their effectiveness in addressing the challenges of 5G deployment. In this paper, we first present the summary of the background, highlighting the increasing demand for high-quality wireless connectivity and the unique characteristics of mid-band (1–6 GHz) and high-band (>6 GHz) frequencies in the 5G spectrum. The methodology comprehensively reviews some of the existing path loss models, considering both empirical and machine learning approaches. We analyze the strengths and weaknesses of these models, considering factors such as urban and suburban environments and indoor scenarios. The results highlight the significant advancements in path loss modeling for mid-band and high-band 5G channels. In terms of prediction accuracy and computing effectiveness, machine learning models performed better than empirical models in both mid-band and high-band frequency spectra. As a result, they might be suggested as an alternative yet promising approach to predicting path loss in these bands. We consider the results of this review to be promising, as they provide network operators and researchers with valuable insights into the state-of-the-art path loss models for mid-band and high-band 5G channels. Future work suggests tuning an ensemble machine learning model to enhance a stable empirical model with multiple parameters to develop a hybrid path loss model for the mid-band frequency spectrum.","PeriodicalId":37982,"journal":{"name":"Future Internet","volume":"64 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135540128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Future Internet
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1