首页 > 最新文献

International Journal of Pervasive Computing and Communications最新文献

英文 中文
Secure data collection and transmission for IoMT architecture integrated with federated learning 集成联邦学习的IoMT架构的安全数据收集和传输
IF 2.6 Q1 Computer Science Pub Date : 2022-05-19 DOI: 10.1108/ijpcc-02-2022-0042
Priyanka kumari Bhansali, Dilendra Hiran, K. Gulati
PurposeThe purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with multiple gateways. It entails IoMT devices and wearables connecting to exchange sensitive data with a sensor node which performs the aggeration process and then communicates the data using a Fog server. If the aggregator sensor loses the connection from the Fog server, it will be unable to submit data directly to the Fog server. The node transmits encrypted information with a neighboring sensor and sends it to the Fog server integrated with federated learning, which encrypts data to the existing data. The fog server performs the operations on the measured data, and the values are stored in the local storage area and later it is updated to the cloud server.Design/methodology/approachSHDCT uses an Internet-of-things (IoT)-based monitoring network, making it possible for smart devices to connect and interact with each other. The main purpose of the monitoring network has been in the collection of biological data and additional information from mobile devices to the patients. The monitoring network is composed of three different types of smart devices that is at the heart of the IoT.FindingsIt has been addressed in this work how to design an architecture for safe data aggregation in heterogeneous IoT-federated learning-enabled wireless sensor networks (WSNs), which makes use of basic encoding and data aggregation methods to achieve this. The authors suggest that the small gateway node (SGN) captures all of the sensed data from the SD and uses a simple, lightweight encoding scheme and cryptographic techniques to convey the data to the gateway node (GWN). The GWN gets all of the medical data from SGN and ensures that the data is accurate and up to date. If the data obtained is trustworthy, then the medical data should be aggregated and sent to the Fog server for further processing. The Java programming language simulates and analyzes the proposed SHDCT model for deployment and message initiation. When comparing the SHDCT scheme to the SPPDA and electrohydrodynamic atomisation (EHDA) schemes, the results show that the SHDCT method performs significantly better. When compared with the SPPDA and EHDA schemes, the suggested SHDCT plan necessitates a lower communication cost. In comparison to EHDA and SPPDA, SHDCT achieves 4.72% and 13.59% less, respectively. When compared to other transmission techniques, SHDCT has a higher transmission ratio. When compared with EHDA and SPPDA, SHDCT achieves 8.47% and 24.41% higher transmission ratios, respectively. When compared with other ways it uses less electricity. When compared with EHDA and SPPDA, SHDCT achieves 5.85% and 18.86% greater residual energy, respectively.Originality/valueIn the health care sector, a series of interconnected medical devices collect data using IoT networks in the health care domain. Preventive,
本文的目的是为了保证健康数据的收集和传输(SHDCT)。在该系统中,本机网络由可与多个网关交互的便携式智能设备组成。它需要连接IoMT设备和可穿戴设备,与执行聚合过程的传感器节点交换敏感数据,然后使用Fog服务器进行数据通信。如果聚合器传感器失去了与Fog服务器的连接,它将无法直接向Fog服务器提交数据。节点与相邻传感器传输加密信息,并将其发送到集成了联邦学习的Fog服务器,该服务器将数据加密到现有数据。雾服务器对测量数据进行操作,测量值存储在本地存储区域,然后更新到云服务器。设计/方法/方法shdct使用基于物联网(IoT)的监控网络,使智能设备能够相互连接和交互。监测网络的主要目的是从移动设备向患者收集生物数据和附加信息。监控网络由三种不同类型的智能设备组成,它们是物联网的核心。本研究讨论了如何在异构物联网联合学习无线传感器网络(wsn)中设计一种安全数据聚合的架构,该架构利用基本编码和数据聚合方法来实现这一目标。作者建议小网关节点(SGN)捕获来自SD的所有感知数据,并使用简单,轻量级的编码方案和加密技术将数据传输到网关节点(GWN)。GWN从SGN获取所有医疗数据,并确保数据的准确性和最新性。如果获得的数据是可信的,则应该聚合医疗数据并将其发送到Fog服务器进行进一步处理。Java编程语言模拟并分析了建议的SHDCT模型,用于部署和消息初始化。将SHDCT方法与SPPDA和EHDA方法进行比较,结果表明SHDCT方法的性能明显优于SPPDA方法。与SPPDA和EHDA方案相比,建议的SHDCT方案需要更低的通信成本。与EHDA和SPPDA相比,SHDCT分别降低了4.72%和13.59%。与其他传输技术相比,SHDCT具有更高的传输率。与EHDA和SPPDA相比,SHDCT的传动比分别提高了8.47%和24.41%。与其他方式相比,它使用更少的电力。与EHDA和SPPDA相比,SHDCT的剩余能量分别提高了5.85%和18.86%。在医疗保健领域,一系列相互连接的医疗设备使用医疗保健领域的物联网网络收集数据。预防性、预测性、个性化和参与性保健在保健部门日益普及。安全的数据收集和传输到集中式服务器是一个具有挑战性的场景。本研究提出了SHDCT的发病机制。该机制由智能医疗物联网设备组成,这些设备致力于联合学习,相互连接以交换健康数据。健康数据非常敏感,需要安全有效地交换。在该机制中,传感设备向SGN发送数据。该SGN使用轻量级编码方案,并执行加密技术与GWN进行数据通信。GWN从SGN获取所有运行状况数据,并确认数据已经过验证。如果接收到的数据是可靠的,则聚合医疗数据并将其传输到Fog服务器以进行进一步处理。从通信成本、传输率和能耗等方面与其他系统进行了性能参数比较。
{"title":"Secure data collection and transmission for IoMT architecture integrated with federated learning","authors":"Priyanka kumari Bhansali, Dilendra Hiran, K. Gulati","doi":"10.1108/ijpcc-02-2022-0042","DOIUrl":"https://doi.org/10.1108/ijpcc-02-2022-0042","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with multiple gateways. It entails IoMT devices and wearables connecting to exchange sensitive data with a sensor node which performs the aggeration process and then communicates the data using a Fog server. If the aggregator sensor loses the connection from the Fog server, it will be unable to submit data directly to the Fog server. The node transmits encrypted information with a neighboring sensor and sends it to the Fog server integrated with federated learning, which encrypts data to the existing data. The fog server performs the operations on the measured data, and the values are stored in the local storage area and later it is updated to the cloud server.\u0000\u0000\u0000Design/methodology/approach\u0000SHDCT uses an Internet-of-things (IoT)-based monitoring network, making it possible for smart devices to connect and interact with each other. The main purpose of the monitoring network has been in the collection of biological data and additional information from mobile devices to the patients. The monitoring network is composed of three different types of smart devices that is at the heart of the IoT.\u0000\u0000\u0000Findings\u0000It has been addressed in this work how to design an architecture for safe data aggregation in heterogeneous IoT-federated learning-enabled wireless sensor networks (WSNs), which makes use of basic encoding and data aggregation methods to achieve this. The authors suggest that the small gateway node (SGN) captures all of the sensed data from the SD and uses a simple, lightweight encoding scheme and cryptographic techniques to convey the data to the gateway node (GWN). The GWN gets all of the medical data from SGN and ensures that the data is accurate and up to date. If the data obtained is trustworthy, then the medical data should be aggregated and sent to the Fog server for further processing. The Java programming language simulates and analyzes the proposed SHDCT model for deployment and message initiation. When comparing the SHDCT scheme to the SPPDA and electrohydrodynamic atomisation (EHDA) schemes, the results show that the SHDCT method performs significantly better. When compared with the SPPDA and EHDA schemes, the suggested SHDCT plan necessitates a lower communication cost. In comparison to EHDA and SPPDA, SHDCT achieves 4.72% and 13.59% less, respectively. When compared to other transmission techniques, SHDCT has a higher transmission ratio. When compared with EHDA and SPPDA, SHDCT achieves 8.47% and 24.41% higher transmission ratios, respectively. When compared with other ways it uses less electricity. When compared with EHDA and SPPDA, SHDCT achieves 5.85% and 18.86% greater residual energy, respectively.\u0000\u0000\u0000Originality/value\u0000In the health care sector, a series of interconnected medical devices collect data using IoT networks in the health care domain. Preventive, ","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41430736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud-based secure data storage and access control for internet of medical things using federated learning 使用联合学习实现基于云的医疗物联网安全数据存储和访问控制
IF 2.6 Q1 Computer Science Pub Date : 2022-05-19 DOI: 10.1108/ijpcc-02-2022-0041
Priyanka kumari Bhansali, Dilendra Hiran, Hemant Kothari, K. Gulati
PurposeThe purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.Design/methodology/approachThis section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.FindingsFor health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.Originality/valueThe Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has
目的本文的目的是计算是最近出现的一种云模型,它为客户提供了无限的设施,降低了客户存储和计算的速率,并提高了易用性,导致在云中存储数据的企业和个人数量激增。云服务被各种组织(教育、医疗和商业)用来存储其数据。例如,在医疗保健行业,患者医疗数据被外包给云服务器。客户可以通过云访问他们的医疗数据,而不是依赖医疗服务提供商。设计/方法论/方法本节解释了所提出的用于安全数据存储和访问控制的基于云的医疗保健系统,称为基于哈希的密文策略属性签名加密(hCP-ABES)。它为访问控制提供了更精细的粒度、安全性、身份验证和医疗数据的用户机密性。它通过散列、加密和签名增强了基于密文策略属性的加密(CP-ABE)。拟议的架构包括保护机制,以确保医疗保健和医疗信息可以通过云在卫生系统之间安全交换。图2描绘了拟议作品的建筑设计。查找对于医疗保健相关的应用程序,与托管在云服务器上的常见文档的安全联系变得越来越重要。然而,设计一种有效和安全的数据访问方法存在许多限制,包括云服务器性能、大量数据用户和各种安全要求。这项工作为经典的CP-ABE技术添加了散列和签名。它保护医疗保健数据的机密性,同时允许细粒度的访问控制。根据对安全需求的分析,这项工作使用联合学习来实现健康信息的隐私和完整性。独创性/价值物联网(IoT)技术和智能诊断植入物通过允许在任何时间、任何地点远程访问和筛查患者的健康问题,增强了医疗保健系统。医疗物联网设备监测患者的健康状况,并将这些信息组合到医疗记录中,然后将这些信息传输到云端,由医疗服务提供商查看以供决策。然而,在信息传输方面,电子健康记录的安全性和保密性成为一个主要问题。这项工作为智能医疗系统提供了有效的数据存储和访问控制,以保护机密性。CP-ABE确保了数据的机密性,还允许在更精细的级别上控制数据访问。此外,它还允许所有者在云层下建立动态的患者健康数据共享策略。hCP-ABES提出了医疗数据的细粒度数据访问、安全性、身份验证和用户隐私。本文通过散列、加密和签名对CP-ABE进行了增强。对所提出的方法进行了评估,结果表明,与其他使用联合学习的访问控制方案相比,所提出的hCP-ABES是可行的。
{"title":"Cloud-based secure data storage and access control for internet of medical things using federated learning","authors":"Priyanka kumari Bhansali, Dilendra Hiran, Hemant Kothari, K. Gulati","doi":"10.1108/ijpcc-02-2022-0041","DOIUrl":"https://doi.org/10.1108/ijpcc-02-2022-0041","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.\u0000\u0000\u0000Design/methodology/approach\u0000This section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.\u0000\u0000\u0000Findings\u0000For health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.\u0000\u0000\u0000Originality/value\u0000The Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41500359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new federated genetic algorithm-based optimization technique for multi-criteria vehicle route planning using ArcGIS network analyst 一种新的基于联邦遗传算法的基于ArcGIS网络分析的多准则车辆路径规划优化技术
IF 2.6 Q1 Computer Science Pub Date : 2022-05-17 DOI: 10.1108/ijpcc-02-2022-0082
Da’ad Ahmad Albalawneh, M. A. Mohamed
PurposeUsing a real-time road network combined with historical traffic data for Al-Salt city, the paper aims to propose a new federated genetic algorithm (GA)-based optimization technique to solve the dynamic vehicle routing problem. Using a GA solver, the estimated routing time for 300 chromosomes (routes) was the shortest and most efficient over 30 generations.Design/methodology/approachIn transportation systems, the objective of route planning techniques has been revised from focusing on road directors to road users. As a result, the new transportation systems use advanced technologies to support drivers and provide them with the road information they need and the services they require to reduce traffic congestion and improve routing problems. In recent decades, numerous studies have been conducted on how to find an efficient and suitable route for vehicles, known as the vehicle routing problem (VRP). To identify the best route, VRP uses real-time information-acquired geographical information systems (GIS) tools.FindingsThis study aims to develop a route planning tool using ArcGIS network analyst to enhance both cost and service quality measures, taking into account several factors to determine the best route based on the users’ preferences.Originality/valueFurthermore, developing a route planning tool using ArcGIS network analyst to enhance both cost and service quality measures, taking into account several factors to determine the best route based on the users’ preferences. An adaptive genetic algorithm (GA) is used to determine the optimal time route, taking into account factors that affect vehicle arrival times and cause delays. In addition, ArcGIS' Network Analyst tool is used to determine the best route based on the user's preferences using a real-time map.
目的利用Al Salt city的实时道路网络和历史交通数据,提出一种新的基于联合遗传算法的优化技术来解决动态车辆路径问题。使用遗传算法求解器,300条染色体(路线)的估计路由时间是30代中最短、最有效的。设计/方法/方法在交通系统中,路线规划技术的目标已经从关注道路指挥者到道路使用者进行了修订。因此,新的交通系统使用先进的技术来支持驾驶员,并为他们提供所需的道路信息和服务,以减少交通拥堵并改善路线问题。近几十年来,人们对如何为车辆找到有效和合适的路线进行了大量研究,称为车辆路线问题(VRP)。为了确定最佳路线,VRP使用实时信息获取地理信息系统(GIS)工具。发现本研究旨在使用ArcGIS网络分析师开发一种路线规划工具,以提高成本和服务质量,并考虑几个因素,根据用户的偏好确定最佳路线。独创性/价值此外,使用ArcGIS网络分析师开发路线规划工具,以提高成本和服务质量,并考虑几个因素,根据用户的偏好确定最佳路线。考虑到影响车辆到达时间和造成延误的因素,使用自适应遗传算法(GA)来确定最佳时间路线。此外,ArcGIS的网络分析工具用于使用实时地图根据用户的偏好确定最佳路线。
{"title":"A new federated genetic algorithm-based optimization technique for multi-criteria vehicle route planning using ArcGIS network analyst","authors":"Da’ad Ahmad Albalawneh, M. A. Mohamed","doi":"10.1108/ijpcc-02-2022-0082","DOIUrl":"https://doi.org/10.1108/ijpcc-02-2022-0082","url":null,"abstract":"\u0000Purpose\u0000Using a real-time road network combined with historical traffic data for Al-Salt city, the paper aims to propose a new federated genetic algorithm (GA)-based optimization technique to solve the dynamic vehicle routing problem. Using a GA solver, the estimated routing time for 300 chromosomes (routes) was the shortest and most efficient over 30 generations.\u0000\u0000\u0000Design/methodology/approach\u0000In transportation systems, the objective of route planning techniques has been revised from focusing on road directors to road users. As a result, the new transportation systems use advanced technologies to support drivers and provide them with the road information they need and the services they require to reduce traffic congestion and improve routing problems. In recent decades, numerous studies have been conducted on how to find an efficient and suitable route for vehicles, known as the vehicle routing problem (VRP). To identify the best route, VRP uses real-time information-acquired geographical information systems (GIS) tools.\u0000\u0000\u0000Findings\u0000This study aims to develop a route planning tool using ArcGIS network analyst to enhance both cost and service quality measures, taking into account several factors to determine the best route based on the users’ preferences.\u0000\u0000\u0000Originality/value\u0000Furthermore, developing a route planning tool using ArcGIS network analyst to enhance both cost and service quality measures, taking into account several factors to determine the best route based on the users’ preferences. An adaptive genetic algorithm (GA) is used to determine the optimal time route, taking into account factors that affect vehicle arrival times and cause delays. In addition, ArcGIS' Network Analyst tool is used to determine the best route based on the user's preferences using a real-time map.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45100031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trusted routing protocol for federated UAV ad hoc network 联邦无人机自组织网络的可信路由协议
IF 2.6 Q1 Computer Science Pub Date : 2022-04-26 DOI: 10.1108/ijpcc-01-2022-0011
Elham Kariri, Kusum Yadav
PurposeIn the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing selection in the route discovery phase, construct a trusted path, and implement a path warning mechanism to detect malicious nodes in the route maintenance phase, respectively.Design/methodology/approachA trust-based on-demand multipath distance vector routing protocol is being developed to address the problem of flying ad-hoc network being subjected to internal attacks and experiencing frequent connection interruptions. Following the construction of the node trust assessment model and the presentation of trust evaluation criteria, the data packet forwarding rate, trusted interaction degree and detection packet receipt rate are discussed. In the next step, the direct trust degree of the adaptive fuzzy trust aggregation network compute node is constructed. After then, rely on the indirect trust degree of neighbouring nodes to calculate the trust degree of the node in the network. Design a trust fluctuation penalty mechanism, as a second step, to defend against the switch attack in the trust model.FindingsWhen compared to the lightweight trust-enhanced routing protocol (TEAOMDV), it significantly improves the data packet delivery rate and throughput of the network significantly.Originality/valueAdditionally, it reduces the amount of routing overhead and the average end-to-end delay.
目的在最后一步,将信任模型应用于按需联合多径距离矢量路由协议(AOMDV),分别在路由发现阶段引入路径信任作为路由选择的基础,构建可信路径,并在路由维护阶段实现路径警告机制以检测恶意节点。设计/方法/方法正在开发一种基于信任的按需多径距离矢量路由协议,以解决飞行自组织网络受到内部攻击和频繁连接中断的问题。在建立节点信任评估模型和提出信任评估标准的基础上,讨论了数据包转发率、可信交互度和检测包接收率。下一步,构造自适应模糊信任聚合网络计算节点的直接信任度。然后,依靠相邻节点的间接信任度来计算节点在网络中的信任度。第二步,设计一个信任波动惩罚机制,以抵御信任模型中的切换攻击。发现与轻量级信任增强路由协议(TEAOMDV)相比,它显著提高了网络的数据包传输速率和吞吐量。独创性/价值此外,它还减少了路由开销和平均端到端延迟。
{"title":"Trusted routing protocol for federated UAV ad hoc network","authors":"Elham Kariri, Kusum Yadav","doi":"10.1108/ijpcc-01-2022-0011","DOIUrl":"https://doi.org/10.1108/ijpcc-01-2022-0011","url":null,"abstract":"\u0000Purpose\u0000In the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing selection in the route discovery phase, construct a trusted path, and implement a path warning mechanism to detect malicious nodes in the route maintenance phase, respectively.\u0000\u0000\u0000Design/methodology/approach\u0000A trust-based on-demand multipath distance vector routing protocol is being developed to address the problem of flying ad-hoc network being subjected to internal attacks and experiencing frequent connection interruptions. Following the construction of the node trust assessment model and the presentation of trust evaluation criteria, the data packet forwarding rate, trusted interaction degree and detection packet receipt rate are discussed. In the next step, the direct trust degree of the adaptive fuzzy trust aggregation network compute node is constructed. After then, rely on the indirect trust degree of neighbouring nodes to calculate the trust degree of the node in the network. Design a trust fluctuation penalty mechanism, as a second step, to defend against the switch attack in the trust model.\u0000\u0000\u0000Findings\u0000When compared to the lightweight trust-enhanced routing protocol (TEAOMDV), it significantly improves the data packet delivery rate and throughput of the network significantly.\u0000\u0000\u0000Originality/value\u0000Additionally, it reduces the amount of routing overhead and the average end-to-end delay.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45199749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of disordered patient’s voice by using pervasive computational algorithms 应用普适计算算法对患者语音进行分类
IF 2.6 Q1 Computer Science Pub Date : 2022-01-25 DOI: 10.1108/ijpcc-07-2021-0158
A. Maddali, Habibullah Khan
PurposeCurrently, the design, technological features of voices, and their analysis of various applications are being simulated with the requirement to communicate at a greater distance or more discreetly. The purpose of this study is to explore how voices and their analyses are used in modern literature to generate a variety of solutions, of which only a few successful models exist.Design/methodologyThe mel-frequency cepstral coefficient (MFCC), average magnitude difference function, cepstrum analysis and other voice characteristics are effectively modeled and implemented using mathematical modeling with variable weights parametric for each algorithm, which can be used with or without noises. Improvising the design characteristics and their weights with different supervised algorithms that regulate the design model simulation.FindingsDifferent data models have been influenced by the parametric range and solution analysis in different space parameters, such as frequency or time model, with features such as without, with and after noise reduction. The frequency response of the current design can be analyzed through the Windowing techniques.Original valueA new model and its implementation scenario with pervasive computational algorithms’ (PCA) (such as the hybrid PCA with AdaBoost (HPCA), PCA with bag of features and improved PCA with bag of features) relating the different features such as MFCC, power spectrum, pitch, Window techniques, etc. are calculated using the HPCA. The features are accumulated on the matrix formulations and govern the design feature comparison and its feature classification for improved performance parameters, as mentioned in the results.
目的目前,语音的设计、技术特征及其对各种应用的分析都在模拟中,要求以更大的距离或更谨慎的方式进行通信。本研究的目的是探索声音及其分析如何在现代文学中被用来产生各种解决方案,其中只有少数成功的模式存在。设计/方法使用数学建模对中频倒谱系数(MFCC)、平均幅度差函数、倒谱分析和其他语音特征进行了有效建模和实现,每个算法的参数权重可变,可以在有噪声或无噪声的情况下使用。用不同的监督算法改进设计特征及其权重,这些算法规范设计模型模拟。发现不同的数据模型受到参数范围的影响,并在不同的空间参数(如频率或时间模型)中进行解分析,具有降噪、降噪和降噪后的特征。当前设计的频率响应可以通过窗口技术进行分析。原始值使用HPCA计算具有普适计算算法(PCA)的新模型及其实现场景(如具有AdaBoost的混合PCA(HPCA)、具有特征袋的PCA和具有特征袋改进的PCA),这些算法与MFCC、功率谱、间距、窗口技术等不同特征相关。这些特征在矩阵公式上累积,并控制设计特征比较及其特征分类,以改进性能参数,如结果中所述。
{"title":"Classification of disordered patient’s voice by using pervasive computational algorithms","authors":"A. Maddali, Habibullah Khan","doi":"10.1108/ijpcc-07-2021-0158","DOIUrl":"https://doi.org/10.1108/ijpcc-07-2021-0158","url":null,"abstract":"\u0000Purpose\u0000Currently, the design, technological features of voices, and their analysis of various applications are being simulated with the requirement to communicate at a greater distance or more discreetly. The purpose of this study is to explore how voices and their analyses are used in modern literature to generate a variety of solutions, of which only a few successful models exist.\u0000\u0000\u0000Design/methodology\u0000The mel-frequency cepstral coefficient (MFCC), average magnitude difference function, cepstrum analysis and other voice characteristics are effectively modeled and implemented using mathematical modeling with variable weights parametric for each algorithm, which can be used with or without noises. Improvising the design characteristics and their weights with different supervised algorithms that regulate the design model simulation.\u0000\u0000\u0000Findings\u0000Different data models have been influenced by the parametric range and solution analysis in different space parameters, such as frequency or time model, with features such as without, with and after noise reduction. The frequency response of the current design can be analyzed through the Windowing techniques.\u0000\u0000\u0000Original value\u0000A new model and its implementation scenario with pervasive computational algorithms’ (PCA) (such as the hybrid PCA with AdaBoost (HPCA), PCA with bag of features and improved PCA with bag of features) relating the different features such as MFCC, power spectrum, pitch, Window techniques, etc. are calculated using the HPCA. The features are accumulated on the matrix formulations and govern the design feature comparison and its feature classification for improved performance parameters, as mentioned in the results.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46350234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network traffic analysis through deep learning for detection of an army of bots in health IoT network 通过深度学习进行网络流量分析,以检测健康物联网网络中的机器人大军
IF 2.6 Q1 Computer Science Pub Date : 2022-01-21 DOI: 10.1108/ijpcc-10-2021-0259
G. K, Brahmananda S.H.
PurposeIoT has a wide range of applications in the health-care sector and has captured the interest of many academic and industrial communities. The health IoT devices suffer from botnet attacks as all the devices are connected to the internet. An army of compromised bots may form to launch a DDoS attack, steal confidential data of patients and disrupt the service, and hence detecting this army of bots is paramount. This study aims to detect botnet attacks in health IoT devices using the deep learning technique.Design/methodology/approachThis paper focuses on designing a method to protect health IoT devices from botnet attacks by constantly observing communication network traffic and classifying them as benign and malicious flow. The proposed algorithm analyzes the health IoT network traffic through implementing Bidirectional long-short term memory, a deep learning technique. The IoT-23 data set is considered for this research as it includes diverse botnet attack scenarios.FindingsThe performance of the proposed method is evaluated using attack prediction accuracy. It results in the highest accuracy of 84.8%, classifying benign and malicious traffic.Originality/valueThe proposed method constantly monitors the health IoT network to detect botnet attacks and classifies the traffic as benign or attack. The system is implemented using the BiLSTM algorithm and trained using the IoT-23 data set. The diversity of attack scenarios of the IoT-23 data set demonstrates the proposed algorithm's competence in detecting botnet types in a heterogeneous environment.
目标物联网在医疗保健领域有着广泛的应用,并引起了许多学术界和工业界的兴趣。由于所有设备都连接到互联网,健康物联网设备都会受到僵尸网络攻击。一支被入侵的机器人大军可能会发起DDoS攻击,窃取患者的机密数据并扰乱服务,因此检测这支机器人大军至关重要。本研究旨在使用深度学习技术检测健康物联网设备中的僵尸网络攻击。设计/方法论/方法本文专注于设计一种方法,通过不断观察通信网络流量并将其分类为良性和恶意流量,来保护健康物联网设备免受僵尸网络攻击。该算法通过实现深度学习技术双向长短期记忆来分析健康物联网网络流量。IoT-23数据集被考虑用于本研究,因为它包括不同的僵尸网络攻击场景。发现使用攻击预测精度来评估所提出方法的性能。它对良性和恶意流量进行了分类,准确率最高,为84.8%。独创性/价值所提出的方法不断监测健康物联网网络,以检测僵尸网络攻击,并将流量分类为良性或攻击。该系统使用BiLSTM算法实现,并使用IoT-23数据集进行训练。IoT-23数据集攻击场景的多样性表明了所提出的算法在异构环境中检测僵尸网络类型的能力。
{"title":"Network traffic analysis through deep learning for detection of an army of bots in health IoT network","authors":"G. K, Brahmananda S.H.","doi":"10.1108/ijpcc-10-2021-0259","DOIUrl":"https://doi.org/10.1108/ijpcc-10-2021-0259","url":null,"abstract":"\u0000Purpose\u0000IoT has a wide range of applications in the health-care sector and has captured the interest of many academic and industrial communities. The health IoT devices suffer from botnet attacks as all the devices are connected to the internet. An army of compromised bots may form to launch a DDoS attack, steal confidential data of patients and disrupt the service, and hence detecting this army of bots is paramount. This study aims to detect botnet attacks in health IoT devices using the deep learning technique.\u0000\u0000\u0000Design/methodology/approach\u0000This paper focuses on designing a method to protect health IoT devices from botnet attacks by constantly observing communication network traffic and classifying them as benign and malicious flow. The proposed algorithm analyzes the health IoT network traffic through implementing Bidirectional long-short term memory, a deep learning technique. The IoT-23 data set is considered for this research as it includes diverse botnet attack scenarios.\u0000\u0000\u0000Findings\u0000The performance of the proposed method is evaluated using attack prediction accuracy. It results in the highest accuracy of 84.8%, classifying benign and malicious traffic.\u0000\u0000\u0000Originality/value\u0000The proposed method constantly monitors the health IoT network to detect botnet attacks and classifies the traffic as benign or attack. The system is implemented using the BiLSTM algorithm and trained using the IoT-23 data set. The diversity of attack scenarios of the IoT-23 data set demonstrates the proposed algorithm's competence in detecting botnet types in a heterogeneous environment.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45705869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A lightweight and flexible mutual authentication and key agreement protocol for wearable sensing devices in WBAN WBAN中一种轻量级、灵活的可穿戴传感设备相互认证和密钥协商协议
IF 2.6 Q1 Computer Science Pub Date : 2022-01-14 DOI: 10.1108/ijpcc-06-2021-0144
Sandeep Kumar Reddy Thota, C. Mala, G. Krishnan
PurposeA wireless body area network (WBAN) is a collection of sensing devices attached to a person’s body that is typically used during health care to track their physical state. This paper aims to study the security challenges and various attacks that occurred while transferring a person’s sensitive medical diagnosis information in WBAN.Design/methodology/approachThis technology has significantly gained prominence in the medical field. These wearable sensors are transferring information to doctors, and there are numerous possibilities for an intruder to pose as a doctor and obtain information about the patient’s vital information. As a result, mutual authentication and session key negotiations are critical security challenges for wearable sensing devices in WBAN. This work proposes an improved mutual authentication and key agreement protocol for wearable sensing devices in WBAN. The existing related schemes require more computational and storage requirements, but the proposed method provides a flexible solution with less complexity.FindingsAs sensor devices are resource-constrained, proposed approach only makes use of cryptographic hash-functions and bit-wise XOR operations, hence it is lightweight and flexible. The protocol’s security is validated using the AVISPA tool, and it will withstand various security attacks. The proposed protocol’s simulation and performance analysis are compared to current relevant schemes and show that it produces efficient outcomes.Originality/valueThis technology has significantly gained prominence in the medical sector. These sensing devises transmit information to doctors, and there are possibilities for an intruder to pose as a doctor and obtain information about the patient’s vital information. Hence, this paper proposes a lightweight and flexible protocol for mutual authentication and key agreement for wearable sensing devices in WBAN only makes use of cryptographic hash-functions and bit-wise XOR operations. The proposed protocol is simulated using AVISPA tool and its performance is better compared to the existing methods. This paper proposes a novel improved mutual authentication and key-agreement protocol for wearable sensing devices in WBAN.
目的无线体域网络(WBAN)是附着在人体上的传感设备的集合,通常在医疗保健期间用于跟踪人体的身体状态。本文旨在研究无线宽带网络在传输个人敏感医疗诊断信息时所面临的安全挑战和各种攻击。设计/方法/方法这项技术在医学领域已获得显著的突出地位。这些可穿戴传感器将信息传递给医生,而入侵者冒充医生获取患者重要信息的可能性有很多。因此,相互认证和会话密钥协商是无线宽带网络中可穿戴传感设备面临的关键安全挑战。本文提出了一种改进的WBAN可穿戴传感设备相互认证和密钥协商协议。现有的相关方案对计算量和存储量的要求较高,而本文提出的方法提供了一种灵活且复杂度较低的解决方案。发现sas传感器设备资源受限,所提出的方法仅利用加密哈希函数和按位异或操作,因此轻量级且灵活。该协议的安全性通过AVISPA工具验证,能够抵御各种安全攻击。将该协议的仿真和性能分析与现有的相关方案进行了比较,结果表明该协议能够产生有效的结果。独创性/价值这项技术在医疗领域获得了显著的突出地位。这些传感装置将信息传送给医生,入侵者就有可能冒充医生获取病人的重要信息。因此,本文提出了一种轻量级、灵活的WBAN可穿戴传感设备相互认证和密钥协商协议,该协议仅利用加密哈希函数和按位异或操作。利用AVISPA工具对该协议进行了仿真,结果表明该协议的性能优于现有协议。提出了一种新的改进的WBAN可穿戴传感设备相互认证和密钥协商协议。
{"title":"A lightweight and flexible mutual authentication and key agreement protocol for wearable sensing devices in WBAN","authors":"Sandeep Kumar Reddy Thota, C. Mala, G. Krishnan","doi":"10.1108/ijpcc-06-2021-0144","DOIUrl":"https://doi.org/10.1108/ijpcc-06-2021-0144","url":null,"abstract":"\u0000Purpose\u0000A wireless body area network (WBAN) is a collection of sensing devices attached to a person’s body that is typically used during health care to track their physical state. This paper aims to study the security challenges and various attacks that occurred while transferring a person’s sensitive medical diagnosis information in WBAN.\u0000\u0000\u0000Design/methodology/approach\u0000This technology has significantly gained prominence in the medical field. These wearable sensors are transferring information to doctors, and there are numerous possibilities for an intruder to pose as a doctor and obtain information about the patient’s vital information. As a result, mutual authentication and session key negotiations are critical security challenges for wearable sensing devices in WBAN. This work proposes an improved mutual authentication and key agreement protocol for wearable sensing devices in WBAN. The existing related schemes require more computational and storage requirements, but the proposed method provides a flexible solution with less complexity.\u0000\u0000\u0000Findings\u0000As sensor devices are resource-constrained, proposed approach only makes use of cryptographic hash-functions and bit-wise XOR operations, hence it is lightweight and flexible. The protocol’s security is validated using the AVISPA tool, and it will withstand various security attacks. The proposed protocol’s simulation and performance analysis are compared to current relevant schemes and show that it produces efficient outcomes.\u0000\u0000\u0000Originality/value\u0000This technology has significantly gained prominence in the medical sector. These sensing devises transmit information to doctors, and there are possibilities for an intruder to pose as a doctor and obtain information about the patient’s vital information. Hence, this paper proposes a lightweight and flexible protocol for mutual authentication and key agreement for wearable sensing devices in WBAN only makes use of cryptographic hash-functions and bit-wise XOR operations. The proposed protocol is simulated using AVISPA tool and its performance is better compared to the existing methods. This paper proposes a novel improved mutual authentication and key-agreement protocol for wearable sensing devices in WBAN.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48092924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Underwater target tracking in three-dimensional environment using intelligent sensor technique 基于智能传感器技术的三维水下目标跟踪
IF 2.6 Q1 Computer Science Pub Date : 2022-01-01 DOI: 10.1108/IJPCC-07-2021-0154
B. Jagan, S. Rao, M. Lakshmi
{"title":"Underwater target tracking in three-dimensional environment using intelligent sensor technique","authors":"B. Jagan, S. Rao, M. Lakshmi","doi":"10.1108/IJPCC-07-2021-0154","DOIUrl":"https://doi.org/10.1108/IJPCC-07-2021-0154","url":null,"abstract":"","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62801883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel utilization-aware and power-delay-aware intelligent DMA controller for video streaming used in AI applications 一种用于人工智能应用中视频流的新型利用率感知和功率延迟感知智能DMA控制器
IF 2.6 Q1 Computer Science Pub Date : 2022-01-01 DOI: 10.1108/IJPCC-11-2021-0280
B. SantoshKumar, E. KrishnaKumar
{"title":"A novel utilization-aware and power-delay-aware intelligent DMA controller for video streaming used in AI applications","authors":"B. SantoshKumar, E. KrishnaKumar","doi":"10.1108/IJPCC-11-2021-0280","DOIUrl":"https://doi.org/10.1108/IJPCC-11-2021-0280","url":null,"abstract":"","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"61997843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrinsic interference suppressed FBMC QAM for MU-MIMO systems in computing and communications 计算和通信中MU-MIMO系统固有干扰抑制FBMC QAM
IF 2.6 Q1 Computer Science Pub Date : 2022-01-01 DOI: 10.1108/IJPCC-09-2021-0217
K. ShobhaY., H. Rangaraju
{"title":"Intrinsic interference suppressed FBMC QAM for MU-MIMO systems in computing and communications","authors":"K. ShobhaY., H. Rangaraju","doi":"10.1108/IJPCC-09-2021-0217","DOIUrl":"https://doi.org/10.1108/IJPCC-09-2021-0217","url":null,"abstract":"","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"62801737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Pervasive Computing and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1