首页 > 最新文献

Computers最新文献

英文 中文
Constructing and Visualizing Uniform Tilings 构建和可视化统一的瓷砖
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-17 DOI: 10.3390/computers12100208
Nelson Max
This paper describes a system which takes user input of a pattern of regular polygons around one vertex and attempts to construct a uniform tiling with the same pattern at every vertex by adding one polygon at a time. The system constructs spherical, planar, or hyperbolic tilings when the sum of the interior angles of the user-specified regular polygons is respectively less than, equal to, or greater than 360∘. Other works have catalogued uniform tilings in tables and/or illustrations. In contrast, this system was developed as an interactive educational tool for people to learn about symmetry and tilings by trial and error through proposing potential vertex patterns and investigating whether they work. Users can watch the rest of the polygons being automatically added one by one with recursive backtracking. When a trial polygon addition is found to violate the conditions of a regular tiling, polygons are removed one by one until a configuration with another compatible choice is found, and that choice is tried next.
本文描述了一个系统,该系统接受用户输入一个围绕一个顶点的正多边形图案,并试图通过每次添加一个多边形来在每个顶点构造具有相同图案的均匀平铺。当用户指定的正多边形的内角之和分别小于、等于或大于360°时,该系统会构造球形、平面或双曲渐变。其他作品在表格和/或插图中编目了均匀的平铺。相比之下,这个系统是作为一种交互式教育工具开发的,通过提出潜在的顶点模式并调查它们是否有效,让人们通过尝试和错误来学习对称和平铺。用户可以通过递归回溯看到剩余的多边形被一个接一个地自动添加。当发现一个尝试多边形的添加违反了规则平铺的条件时,将一个接一个地删除多边形,直到找到具有另一个兼容选择的配置,然后再尝试该选择。
{"title":"Constructing and Visualizing Uniform Tilings","authors":"Nelson Max","doi":"10.3390/computers12100208","DOIUrl":"https://doi.org/10.3390/computers12100208","url":null,"abstract":"This paper describes a system which takes user input of a pattern of regular polygons around one vertex and attempts to construct a uniform tiling with the same pattern at every vertex by adding one polygon at a time. The system constructs spherical, planar, or hyperbolic tilings when the sum of the interior angles of the user-specified regular polygons is respectively less than, equal to, or greater than 360∘. Other works have catalogued uniform tilings in tables and/or illustrations. In contrast, this system was developed as an interactive educational tool for people to learn about symmetry and tilings by trial and error through proposing potential vertex patterns and investigating whether they work. Users can watch the rest of the polygons being automatically added one by one with recursive backtracking. When a trial polygon addition is found to violate the conditions of a regular tiling, polygons are removed one by one until a configuration with another compatible choice is found, and that choice is tried next.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135994296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Machine Learning and Routing Protocols for Optimizing Distributed SPARQL Queries in Collaboration 使用机器学习和路由协议优化协作中的分布式SPARQL查询
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-17 DOI: 10.3390/computers12100210
Benjamin Warnke, Stefan Fischer, Sven Groppe
Due to increasing digitization, the amount of data in the Internet of Things (IoT) is constantly increasing. In order to be able to process queries efficiently, strategies must, therefore, be found to reduce the transmitted data as much as possible. SPARQL is particularly well-suited to the IoT environment because it can handle various data structures. Due to the flexibility of data structures, however, more data have to be joined again during processing. Therefore, a good join order is crucial as it significantly impacts the number of intermediate results. However, computing the best linking order is an NP-hard problem because the total number of possible linking orders increases exponentially with the number of inputs to be combined. In addition, there are different definitions of optimal join orders. Machine learning uses stochastic methods to achieve good results even with complex problems quickly. Other DBMSs also consider reducing network traffic but neglect the network topology. Network topology is crucial in IoT as devices are not evenly distributed. Therefore, we present new techniques for collaboration between routing, application, and machine learning. Our approach, which pushes the operators as close as possible to the data source, minimizes the produced network traffic by 10%. Additionally, the model can reduce the number of intermediate results by a factor of 100 in comparison to other state-of-the-art approaches.
由于数字化程度的提高,物联网(IoT)中的数据量不断增加。因此,为了能够有效地处理查询,必须找到尽可能减少传输数据的策略。SPARQL特别适合物联网环境,因为它可以处理各种数据结构。然而,由于数据结构的灵活性,在处理过程中必须再次连接更多的数据。因此,良好的连接顺序至关重要,因为它会显著影响中间结果的数量。然而,计算最佳连接顺序是一个np困难问题,因为可能的连接顺序的总数随着要组合的输入数量呈指数增长。此外,最优连接顺序有不同的定义。机器学习使用随机方法,即使是复杂的问题也能快速获得良好的结果。其他dbms也考虑减少网络流量,但忽略了网络拓扑。由于设备分布不均,网络拓扑在物联网中至关重要。因此,我们提出了路由、应用和机器学习之间协作的新技术。我们的方法使运营商尽可能靠近数据源,将产生的网络流量减少了10%。此外,与其他最先进的方法相比,该模型可以将中间结果的数量减少100倍。
{"title":"Using Machine Learning and Routing Protocols for Optimizing Distributed SPARQL Queries in Collaboration","authors":"Benjamin Warnke, Stefan Fischer, Sven Groppe","doi":"10.3390/computers12100210","DOIUrl":"https://doi.org/10.3390/computers12100210","url":null,"abstract":"Due to increasing digitization, the amount of data in the Internet of Things (IoT) is constantly increasing. In order to be able to process queries efficiently, strategies must, therefore, be found to reduce the transmitted data as much as possible. SPARQL is particularly well-suited to the IoT environment because it can handle various data structures. Due to the flexibility of data structures, however, more data have to be joined again during processing. Therefore, a good join order is crucial as it significantly impacts the number of intermediate results. However, computing the best linking order is an NP-hard problem because the total number of possible linking orders increases exponentially with the number of inputs to be combined. In addition, there are different definitions of optimal join orders. Machine learning uses stochastic methods to achieve good results even with complex problems quickly. Other DBMSs also consider reducing network traffic but neglect the network topology. Network topology is crucial in IoT as devices are not evenly distributed. Therefore, we present new techniques for collaboration between routing, application, and machine learning. Our approach, which pushes the operators as close as possible to the data source, minimizes the produced network traffic by 10%. Additionally, the model can reduce the number of intermediate results by a factor of 100 in comparison to other state-of-the-art approaches.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136037623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Robustness of ML-Based Network Intrusion Detection Systems: An Adversarial and Distribution Shift Perspective 基于机器学习的网络入侵检测系统的鲁棒性:一个对抗和分布转移的视角
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-17 DOI: 10.3390/computers12100209
Minxiao Wang, Ning Yang, Dulaj H. Gunasinghe, Ning Weng
Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associated with ML: adversarial attacks and distribution shifts. Although there has been a growing emphasis on researching the robustness of ML, current studies primarily concentrate on addressing specific challenges individually. These studies tend to target a particular aspect of robustness and propose innovative techniques to enhance that specific aspect. However, as a capability to respond to unexpected situations, the robustness of ML should be comprehensively built and maintained in every stage. In this paper, we aim to link the varying efforts throughout the whole ML workflow to guide the design of ML-based NIDSs with systematic robustness. Toward this goal, we conduct a methodical evaluation of the progress made thus far in enhancing the robustness of the targeted NIDS application task. Specifically, we delve into the robustness aspects of ML-based NIDSs against adversarial attacks and distribution shift scenarios. For each perspective, we organize the literature in robustness-related challenges and technical solutions based on the ML workflow. For instance, we introduce some advanced potential solutions that can improve robustness, such as data augmentation, contrastive learning, and robustness certification. According to our survey, we identify and discuss the ML robustness research gaps and future direction in the field of NIDS. Finally, we highlight that building and patching robustness throughout the life cycle of an ML-based NIDS is critical.
由于当前机器学习模型对各种威胁的固有敏感性,将基于机器学习(ML)的方法用于网络入侵检测系统(nids)引起了有效的关注。特别值得关注的是与机器学习相关的两个重大威胁:对抗性攻击和分布转移。尽管人们越来越重视机器学习的鲁棒性研究,但目前的研究主要集中在解决具体的挑战上。这些研究倾向于针对鲁棒性的一个特定方面,并提出创新的技术来增强该特定方面。然而,作为一种应对突发情况的能力,机器学习的鲁棒性在每个阶段都应该得到全面的构建和维护。在本文中,我们的目标是将整个ML工作流程中的各种努力联系起来,以指导基于ML的nids的设计,并具有系统的鲁棒性。为了实现这一目标,我们对迄今为止在增强目标NIDS应用任务的稳健性方面取得的进展进行了系统的评估。具体来说,我们深入研究了基于机器学习的nids对对抗性攻击和分布转移场景的鲁棒性方面。对于每个观点,我们组织了基于ML工作流的鲁棒性相关挑战和技术解决方案的文献。例如,我们介绍了一些可以提高鲁棒性的高级潜在解决方案,如数据增强、对比学习和鲁棒性认证。根据我们的调查,我们确定并讨论了机器学习鲁棒性研究在NIDS领域的差距和未来方向。最后,我们强调在基于ml的NIDS的整个生命周期中构建和修补健壮性是至关重要的。
{"title":"On the Robustness of ML-Based Network Intrusion Detection Systems: An Adversarial and Distribution Shift Perspective","authors":"Minxiao Wang, Ning Yang, Dulaj H. Gunasinghe, Ning Weng","doi":"10.3390/computers12100209","DOIUrl":"https://doi.org/10.3390/computers12100209","url":null,"abstract":"Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associated with ML: adversarial attacks and distribution shifts. Although there has been a growing emphasis on researching the robustness of ML, current studies primarily concentrate on addressing specific challenges individually. These studies tend to target a particular aspect of robustness and propose innovative techniques to enhance that specific aspect. However, as a capability to respond to unexpected situations, the robustness of ML should be comprehensively built and maintained in every stage. In this paper, we aim to link the varying efforts throughout the whole ML workflow to guide the design of ML-based NIDSs with systematic robustness. Toward this goal, we conduct a methodical evaluation of the progress made thus far in enhancing the robustness of the targeted NIDS application task. Specifically, we delve into the robustness aspects of ML-based NIDSs against adversarial attacks and distribution shift scenarios. For each perspective, we organize the literature in robustness-related challenges and technical solutions based on the ML workflow. For instance, we introduce some advanced potential solutions that can improve robustness, such as data augmentation, contrastive learning, and robustness certification. According to our survey, we identify and discuss the ML robustness research gaps and future direction in the field of NIDS. Finally, we highlight that building and patching robustness throughout the life cycle of an ML-based NIDS is critical.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136032784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Augmented Reality in Primary Education: An Active Learning Approach in Mathematics 增强现实在小学教育:一种积极的数学学习方法
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-16 DOI: 10.3390/computers12100207
Christina Volioti, Christos Orovas, Theodosios Sapounidis, George Trachanas, Euclid Keramopoulos
Active learning, a student-centered approach, engages students in the learning process and requires them to solve problems using educational activities that enhance their learning outcomes. Augmented Reality (AR) has revolutionized the field of education by creating an intuitive environment where real and virtual objects interact, thereby facilitating the understanding of complex concepts. Consequently, this research proposes an application, called “Cooking Math”, that utilizes AR to promote active learning in sixth-grade elementary school mathematics. The application comprises various educational games, each presenting a real-life problem, particularly focused on cooking recipes. To evaluate the usability of the proposed AR application, a pilot study was conducted involving three groups: (a) 65 undergraduate philosophy and education students, (b) 74 undergraduate engineering students, and (c) 35 sixth-grade elementary school students. To achieve this, (a) the System Usability Scale (SUS) questionnaire was provided to all participants and (b) semi-structured interviews were organized to gather the participants’ perspectives. The SUS results were quite satisfactory. In addition, the interviews’ outcomes indicated that the elementary students displayed enthusiasm, the philosophy and education students emphasized the pedagogy value of such technology, while the engineering students suggested that further improvements were necessary to enhance the effectiveness of the learning experience.
主动学习是一种以学生为中心的方法,它使学生参与到学习过程中,并要求他们通过教育活动来解决问题,从而提高他们的学习成果。增强现实(AR)通过创建真实和虚拟对象交互的直观环境,从而促进对复杂概念的理解,从而彻底改变了教育领域。因此,本研究提出了一个名为“烹饪数学”的应用程序,该应用程序利用AR来促进小学六年级数学的主动学习。该应用程序包括各种教育游戏,每个游戏都呈现一个现实生活中的问题,特别是烹饪食谱。为了评估拟议的AR应用程序的可用性,进行了一项试点研究,涉及三组:(a) 65名哲学和教育学本科学生,(b) 74名工科本科学生,(c) 35名六年级小学生。为此,(a)向所有参与者提供了系统可用性量表(SUS)问卷,以及(b)组织了半结构化访谈,以收集参与者的观点。SUS的结果非常令人满意。此外,访谈结果显示,小学生表现出热情,哲学与教育学学生强调该技术的教学价值,而工科学生则认为需要进一步改进以提高学习体验的有效性。
{"title":"Augmented Reality in Primary Education: An Active Learning Approach in Mathematics","authors":"Christina Volioti, Christos Orovas, Theodosios Sapounidis, George Trachanas, Euclid Keramopoulos","doi":"10.3390/computers12100207","DOIUrl":"https://doi.org/10.3390/computers12100207","url":null,"abstract":"Active learning, a student-centered approach, engages students in the learning process and requires them to solve problems using educational activities that enhance their learning outcomes. Augmented Reality (AR) has revolutionized the field of education by creating an intuitive environment where real and virtual objects interact, thereby facilitating the understanding of complex concepts. Consequently, this research proposes an application, called “Cooking Math”, that utilizes AR to promote active learning in sixth-grade elementary school mathematics. The application comprises various educational games, each presenting a real-life problem, particularly focused on cooking recipes. To evaluate the usability of the proposed AR application, a pilot study was conducted involving three groups: (a) 65 undergraduate philosophy and education students, (b) 74 undergraduate engineering students, and (c) 35 sixth-grade elementary school students. To achieve this, (a) the System Usability Scale (SUS) questionnaire was provided to all participants and (b) semi-structured interviews were organized to gather the participants’ perspectives. The SUS results were quite satisfactory. In addition, the interviews’ outcomes indicated that the elementary students displayed enthusiasm, the philosophy and education students emphasized the pedagogy value of such technology, while the engineering students suggested that further improvements were necessary to enhance the effectiveness of the learning experience.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"1140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136114010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Potential of Machine Learning for Wind Speed and Direction Short-Term Forecasting: A Systematic Review 机器学习在风速和风向短期预报中的潜力:系统综述
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-13 DOI: 10.3390/computers12100206
Décio Alves, Fábio Mendonça, Sheikh Shanawaz Mostafa, Fernando Morgado-Dias
Wind forecasting, which is essential for numerous services and safety, has significantly improved in accuracy due to machine learning advancements. This study reviews 23 articles from 1983 to 2023 on machine learning for wind speed and direction nowcasting. The wind prediction ranged from 1 min to 1 week, with more articles at lower temporal resolutions. Most works employed neural networks, focusing recently on deep learning models. Among the reported performance metrics, the most prevalent were mean absolute error, mean squared error, and mean absolute percentage error. Considering these metrics, the mean performance of the examined works was 0.56 m/s, 1.10 m/s, and 6.72%, respectively. The results underscore the novel effectiveness of machine learning in predicting wind conditions using high-resolution time data and demonstrated that deep learning models surpassed traditional methods, improving the accuracy of wind speed and direction forecasts. Moreover, it was found that the inclusion of non-wind weather variables does not benefit the model’s overall performance. Further studies are recommended to predict both wind speed and direction using diverse spatial data points, and high-resolution data are recommended along with the usage of deep learning models.
由于机器学习的进步,对许多服务和安全至关重要的风力预报的准确性大大提高。本研究回顾了从1983年到2023年关于机器学习用于风速和风向临近预报的23篇文章。风速预报范围从1分钟到1周不等,有更多的文章在较低的时间分辨率。大多数研究都使用了神经网络,最近关注的是深度学习模型。在报告的性能指标中,最常见的是平均绝对误差、均方误差和平均绝对百分比误差。考虑到这些指标,测试工程的平均性能分别为0.56米/秒、1.10米/秒和6.72%。研究结果强调了机器学习在使用高分辨率时间数据预测风况方面的新有效性,并证明深度学习模型超越了传统方法,提高了风速和风向预测的准确性。此外,发现非风天气变量的纳入并不有利于模型的整体性能。建议进一步研究使用不同的空间数据点来预测风速和风向,并建议使用高分辨率数据和深度学习模型。
{"title":"The Potential of Machine Learning for Wind Speed and Direction Short-Term Forecasting: A Systematic Review","authors":"Décio Alves, Fábio Mendonça, Sheikh Shanawaz Mostafa, Fernando Morgado-Dias","doi":"10.3390/computers12100206","DOIUrl":"https://doi.org/10.3390/computers12100206","url":null,"abstract":"Wind forecasting, which is essential for numerous services and safety, has significantly improved in accuracy due to machine learning advancements. This study reviews 23 articles from 1983 to 2023 on machine learning for wind speed and direction nowcasting. The wind prediction ranged from 1 min to 1 week, with more articles at lower temporal resolutions. Most works employed neural networks, focusing recently on deep learning models. Among the reported performance metrics, the most prevalent were mean absolute error, mean squared error, and mean absolute percentage error. Considering these metrics, the mean performance of the examined works was 0.56 m/s, 1.10 m/s, and 6.72%, respectively. The results underscore the novel effectiveness of machine learning in predicting wind conditions using high-resolution time data and demonstrated that deep learning models surpassed traditional methods, improving the accuracy of wind speed and direction forecasts. Moreover, it was found that the inclusion of non-wind weather variables does not benefit the model’s overall performance. Further studies are recommended to predict both wind speed and direction using diverse spatial data points, and high-resolution data are recommended along with the usage of deep learning models.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135859093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Optimized Strategy Based on Multi-Next-Hops Election to Reduce Video Transmission Delay for GPSR Protocol over VANETs 基于多下一跳选择的GPSR协议视频传输延迟优化策略
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-12 DOI: 10.3390/computers12100205
Imane Zaimi, Abdelali Boushaba, Mohammed Oumsis, Brahim Jabir, Moulay Hafid Aabidi, Adil EL Makrani
Reducing transmission traffic delay is one of the most important issues that need to be considered for routing protocols, especially in the case of multimedia applications over vehicular ad hoc networks (VANET). To this end, we propose an extension of the FzGR (fuzzy geographical routing protocol), named MNH-FGR (multi-next-hops fuzzy geographical routing protocol). MNH-FGR is a multipath protocol that gains great extensibility by employing different link metrics and weight functions. To schedule multimedia traffic among multiple heterogeneous links, MNH-FGR integrates the weighted round-robin (WRR) scheduling algorithm, where the link weights, needed for scheduling, are computed using the multi-constrained QoS metric provided by the FzGR. The main goal is to ensure the stability of the network and the continuity of data flow during transmission. Simulation experiments with NS-2 are presented in order to validate our proposal. Additionally, we present a neural network algorithm to analyze and optimize the performance of routing protocols. The results show that MNH-FGR could satisfy critical multimedia applications with high on-time constraints. Also, the DNN model used can provide insights about which features had an impact on protocol performance.
减少传输流量延迟是路由协议需要考虑的最重要的问题之一,特别是在车载自组织网络(VANET)上的多媒体应用。为此,我们提出了模糊地理路由协议(FzGR)的扩展,命名为MNH-FGR(多下一跳模糊地理路由协议)。MNH-FGR是一种多路径协议,通过采用不同的链路度量和权重函数获得了很好的可扩展性。为了在多条异构链路之间调度多媒体流量,MNH-FGR融合了加权轮循调度算法(weighted round-robin, WRR),利用FzGR提供的多约束QoS度量来计算调度所需的链路权重。主要目标是保证网络的稳定性和传输过程中数据流的连续性。通过NS-2的仿真实验验证了我们的方案。此外,我们还提出了一种神经网络算法来分析和优化路由协议的性能。结果表明,MNH-FGR可以满足高准时约束的关键多媒体应用。此外,所使用的DNN模型可以提供有关哪些特征对协议性能有影响的见解。
{"title":"Novel Optimized Strategy Based on Multi-Next-Hops Election to Reduce Video Transmission Delay for GPSR Protocol over VANETs","authors":"Imane Zaimi, Abdelali Boushaba, Mohammed Oumsis, Brahim Jabir, Moulay Hafid Aabidi, Adil EL Makrani","doi":"10.3390/computers12100205","DOIUrl":"https://doi.org/10.3390/computers12100205","url":null,"abstract":"Reducing transmission traffic delay is one of the most important issues that need to be considered for routing protocols, especially in the case of multimedia applications over vehicular ad hoc networks (VANET). To this end, we propose an extension of the FzGR (fuzzy geographical routing protocol), named MNH-FGR (multi-next-hops fuzzy geographical routing protocol). MNH-FGR is a multipath protocol that gains great extensibility by employing different link metrics and weight functions. To schedule multimedia traffic among multiple heterogeneous links, MNH-FGR integrates the weighted round-robin (WRR) scheduling algorithm, where the link weights, needed for scheduling, are computed using the multi-constrained QoS metric provided by the FzGR. The main goal is to ensure the stability of the network and the continuity of data flow during transmission. Simulation experiments with NS-2 are presented in order to validate our proposal. Additionally, we present a neural network algorithm to analyze and optimize the performance of routing protocols. The results show that MNH-FGR could satisfy critical multimedia applications with high on-time constraints. Also, the DNN model used can provide insights about which features had an impact on protocol performance.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135967907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining Resampling Ratios Using BSMOTE and SVM-SMOTE for Identifying Rare Attacks in Imbalanced Cybersecurity Data 利用BSMOTE和SVM-SMOTE确定重采样比识别不平衡网络安全数据中的罕见攻击
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-11 DOI: 10.3390/computers12100204
Sikha S. Bagui, Dustin Mink, Subhash C. Bagui, Sakthivel Subramaniam
Machine Learning is widely used in cybersecurity for detecting network intrusions. Though network attacks are increasing steadily, the percentage of such attacks to actual network traffic is significantly less. And here lies the problem in training Machine Learning models to enable them to detect and classify malicious attacks from routine traffic. The ratio of actual attacks to benign data is significantly high and as such forms highly imbalanced datasets. In this work, we address this issue using data resampling techniques. Though there are several oversampling and undersampling techniques available, how these oversampling and undersampling techniques are most effectively used is addressed in this paper. Two oversampling techniques, Borderline SMOTE and SVM-SMOTE, are used for oversampling minority data and random undersampling is used for undersampling majority data. Both the oversampling techniques use KNN after selecting a random minority sample point, hence the impact of varying KNN values on the performance of the oversampling technique is also analyzed. Random Forest is used for classification of the rare attacks. This work is done on a widely used cybersecurity dataset, UNSW-NB15, and the results show that 10% oversampling gives better results for both BMSOTE and SVM-SMOTE.
机器学习被广泛应用于网络安全领域,用于检测网络入侵。尽管网络攻击正在稳步增加,但此类攻击占实际网络流量的比例明显较低。这里的问题在于训练机器学习模型,使它们能够从日常流量中检测和分类恶意攻击。实际攻击与良性数据的比例非常高,因此形成了高度不平衡的数据集。在这项工作中,我们使用数据重采样技术解决了这个问题。虽然有几种可用的过采样和欠采样技术,但如何最有效地使用这些过采样和欠采样技术是本文的重点。两种过采样技术:Borderline SMOTE和SVM-SMOTE用于过采样少数数据,随机欠采样用于欠采样多数数据。两种过采样技术都是在随机选择少数样本点后使用KNN,因此还分析了不同KNN值对过采样技术性能的影响。随机森林用于罕见攻击的分类。这项工作是在一个广泛使用的网络安全数据集UNSW-NB15上完成的,结果表明,10%的过采样对BMSOTE和SVM-SMOTE都有更好的结果。
{"title":"Determining Resampling Ratios Using BSMOTE and SVM-SMOTE for Identifying Rare Attacks in Imbalanced Cybersecurity Data","authors":"Sikha S. Bagui, Dustin Mink, Subhash C. Bagui, Sakthivel Subramaniam","doi":"10.3390/computers12100204","DOIUrl":"https://doi.org/10.3390/computers12100204","url":null,"abstract":"Machine Learning is widely used in cybersecurity for detecting network intrusions. Though network attacks are increasing steadily, the percentage of such attacks to actual network traffic is significantly less. And here lies the problem in training Machine Learning models to enable them to detect and classify malicious attacks from routine traffic. The ratio of actual attacks to benign data is significantly high and as such forms highly imbalanced datasets. In this work, we address this issue using data resampling techniques. Though there are several oversampling and undersampling techniques available, how these oversampling and undersampling techniques are most effectively used is addressed in this paper. Two oversampling techniques, Borderline SMOTE and SVM-SMOTE, are used for oversampling minority data and random undersampling is used for undersampling majority data. Both the oversampling techniques use KNN after selecting a random minority sample point, hence the impact of varying KNN values on the performance of the oversampling technique is also analyzed. Random Forest is used for classification of the rare attacks. This work is done on a widely used cybersecurity dataset, UNSW-NB15, and the results show that 10% oversampling gives better results for both BMSOTE and SVM-SMOTE.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136209682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS-Aware and Energy Data Management in Industrial IoT 工业物联网中的qos感知和能源数据管理
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-10 DOI: 10.3390/computers12100203
Yarob Abdullah, Zeinab Movahedi
Two crucial challenges in Industry 4.0 involve maintaining critical latency requirements for data access and ensuring efficient power consumption by field devices. Traditional centralized industrial networks that provide rudimentary data distribution capabilities may not be able to meet such stringent requirements. These requirements cannot be met later due to connection or node failures or extreme performance decadence. To address this problem, this paper focuses on resource-constrained networks of Internet of Things (IoT) systems, exploiting the presence of several more powerful nodes acting as distributed local data storage proxies for every IoT set. To increase the battery lifetime of the network, a number of nodes that are not included in data transmission or data storage are turned off. In this paper, we investigate the issue of maximizing network lifetime, and consider the restrictions on data access latency. For this purpose, data are cached distributively in proxy nodes, leading to a reduction in energy consumption and ultimately maximizing network lifetime. To address this problem, we introduce an energy-aware data management method (EDMM); with the goal of extending network lifetime, select IoT nodes are designated to save data distributively. Our proposed approach (1) makes sure that data access latency is underneath a specified threshold and (2) performs well with respect to network lifetime compared to an offline centralized heuristic algorithm.
工业4.0面临的两个关键挑战包括维持数据访问的关键延迟要求和确保现场设备的高效功耗。提供基本数据分发功能的传统集中式工业网络可能无法满足如此严格的要求。由于连接或节点故障或严重的性能下降,这些要求将无法满足。为了解决这个问题,本文将重点放在物联网(IoT)系统的资源约束网络上,利用几个更强大的节点作为每个物联网集的分布式本地数据存储代理。为了延长网络的电池寿命,一些不参与数据传输或数据存储的节点被关闭。在本文中,我们研究了最大化网络生命周期的问题,并考虑了对数据访问延迟的限制。为此,数据分布地缓存在代理节点中,从而减少了能耗,最终最大化了网络生命周期。为了解决这个问题,我们引入了一种能量感知数据管理方法(EDMM);以延长网络生命周期为目标,选择物联网节点进行分布式数据保存。我们提出的方法(1)确保数据访问延迟低于指定的阈值,(2)与离线集中式启发式算法相比,在网络生命周期方面表现良好。
{"title":"QoS-Aware and Energy Data Management in Industrial IoT","authors":"Yarob Abdullah, Zeinab Movahedi","doi":"10.3390/computers12100203","DOIUrl":"https://doi.org/10.3390/computers12100203","url":null,"abstract":"Two crucial challenges in Industry 4.0 involve maintaining critical latency requirements for data access and ensuring efficient power consumption by field devices. Traditional centralized industrial networks that provide rudimentary data distribution capabilities may not be able to meet such stringent requirements. These requirements cannot be met later due to connection or node failures or extreme performance decadence. To address this problem, this paper focuses on resource-constrained networks of Internet of Things (IoT) systems, exploiting the presence of several more powerful nodes acting as distributed local data storage proxies for every IoT set. To increase the battery lifetime of the network, a number of nodes that are not included in data transmission or data storage are turned off. In this paper, we investigate the issue of maximizing network lifetime, and consider the restrictions on data access latency. For this purpose, data are cached distributively in proxy nodes, leading to a reduction in energy consumption and ultimately maximizing network lifetime. To address this problem, we introduce an energy-aware data management method (EDMM); with the goal of extending network lifetime, select IoT nodes are designated to save data distributively. Our proposed approach (1) makes sure that data access latency is underneath a specified threshold and (2) performs well with respect to network lifetime compared to an offline centralized heuristic algorithm.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136295071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets 基于中性Petri网的信息包过滤防火墙建模的信息安全工程框架
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-08 DOI: 10.3390/computers12100202
Jamal Khudair Madhloom, Zainab Hammoodi Noori, Sif K. Ebis, Oday A. Hassen, Saad M. Darwish
Due to the Internet’s explosive growth, network security is now a major concern; as a result, tracking network traffic is essential for a variety of uses, including improving system efficiency, fixing bugs in the network, and keeping sensitive data secure. Firewalls are a crucial component of enterprise-wide security architectures because they protect individual networks from intrusion. The efficiency of a firewall can be negatively impacted by issues with its design, configuration, monitoring, and administration. Recent firewall security methods do not have the rigor to manage the vagueness that comes with filtering packets from the exterior. Knowledge representation and reasoning are two areas where fuzzy Petri nets (FPNs) receive extensive usage as a modeling tool. Despite their widespread success, FPNs’ limitations in the security engineering field stem from the fact that it is difficult to represent different kinds of uncertainty. This article details the construction of a novel packet-filtering firewall model that addresses the limitations of current FPN-based filtering methods. The primary contribution is to employ Simplified Neutrosophic Petri nets (SNPNs) as a tool for modeling discrete event systems in the area of firewall packet filtering that are characterized by imprecise knowledge. Because of SNPNs’ symbolic ability, the packet filtration model can be quickly and easily established, examined, enhanced, and maintained. Based on the idea that the ambiguity of a packet’s movement can be described by if–then fuzzy production rules realized by the truth-membership function, the indeterminacy-membership function, and the falsity-membership functional, we adopt the neutrosophic logic for modelling PN transition objects. In addition, we simulate the dynamic behavior of the tracking system in light of the ambiguity inherent in packet filtering by presenting a two-level filtering method to improve the ranking of the filtering rules list. Results from experiments on a local area network back up the efficacy of the proposed method and illustrate how it can increase the firewall’s susceptibility to threats posed by network traffic.
由于互联网的爆炸式增长,网络安全现在是一个大问题;因此,跟踪网络流量对于各种用途都是必不可少的,包括提高系统效率、修复网络中的错误和保持敏感数据的安全。防火墙是企业级安全体系结构的重要组成部分,因为它们保护各个网络免受入侵。防火墙的设计、配置、监控和管理问题可能会对防火墙的效率产生负面影响。最近的防火墙安全方法没有严格管理来自外部的数据包过滤带来的模糊性。知识表示和推理是模糊Petri网(fpn)作为建模工具得到广泛应用的两个领域。尽管fpn获得了广泛的成功,但它在安全工程领域的局限性源于难以表示不同类型的不确定性。本文详细介绍了一种新型包过滤防火墙模型的构建,该模型解决了当前基于fpn的过滤方法的局限性。主要贡献是采用简化中性Petri网(SNPNs)作为建模防火墙包过滤领域离散事件系统的工具,其特征是不精确的知识。由于snpn的符号化能力,可以快速、方便地建立、检测、增强和维护包过滤模型。基于数据包运动的模糊性可以用由真值隶属函数、不确定性隶属函数和假值隶属函数实现的if-then模糊产生规则来描述的思想,我们采用中性逻辑对PN转移对象进行建模。此外,针对包过滤固有的模糊性,我们通过提出两级过滤方法来模拟跟踪系统的动态行为,以提高过滤规则列表的排序。在局域网上的实验结果支持了该方法的有效性,并说明了该方法如何提高防火墙对网络流量威胁的敏感性。
{"title":"An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets","authors":"Jamal Khudair Madhloom, Zainab Hammoodi Noori, Sif K. Ebis, Oday A. Hassen, Saad M. Darwish","doi":"10.3390/computers12100202","DOIUrl":"https://doi.org/10.3390/computers12100202","url":null,"abstract":"Due to the Internet’s explosive growth, network security is now a major concern; as a result, tracking network traffic is essential for a variety of uses, including improving system efficiency, fixing bugs in the network, and keeping sensitive data secure. Firewalls are a crucial component of enterprise-wide security architectures because they protect individual networks from intrusion. The efficiency of a firewall can be negatively impacted by issues with its design, configuration, monitoring, and administration. Recent firewall security methods do not have the rigor to manage the vagueness that comes with filtering packets from the exterior. Knowledge representation and reasoning are two areas where fuzzy Petri nets (FPNs) receive extensive usage as a modeling tool. Despite their widespread success, FPNs’ limitations in the security engineering field stem from the fact that it is difficult to represent different kinds of uncertainty. This article details the construction of a novel packet-filtering firewall model that addresses the limitations of current FPN-based filtering methods. The primary contribution is to employ Simplified Neutrosophic Petri nets (SNPNs) as a tool for modeling discrete event systems in the area of firewall packet filtering that are characterized by imprecise knowledge. Because of SNPNs’ symbolic ability, the packet filtration model can be quickly and easily established, examined, enhanced, and maintained. Based on the idea that the ambiguity of a packet’s movement can be described by if–then fuzzy production rules realized by the truth-membership function, the indeterminacy-membership function, and the falsity-membership functional, we adopt the neutrosophic logic for modelling PN transition objects. In addition, we simulate the dynamic behavior of the tracking system in light of the ambiguity inherent in packet filtering by presenting a two-level filtering method to improve the ranking of the filtering rules list. Results from experiments on a local area network back up the efficacy of the proposed method and illustrate how it can increase the firewall’s susceptibility to threats posed by network traffic.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135198626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MalFe—Malware Feature Engineering Generation Platform 恶意软件特征工程生成平台
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-10-08 DOI: 10.3390/computers12100201
Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter
The growing sophistication of malware has resulted in diverse challenges, especially among security researchers who are expected to develop mechanisms to thwart these malicious attacks. While security researchers have turned to machine learning to combat this surge in malware attacks and enhance detection and prevention methods, they often encounter limitations when it comes to sourcing malware binaries. This limitation places the burden on malware researchers to create context-specific datasets and detection mechanisms, a time-consuming and intricate process that involves a series of experiments. The lack of accessible analysis reports and a centralized platform for sharing and verifying findings has resulted in many research outputs that can neither be replicated nor validated. To address this critical gap, a malware analysis data curation platform was developed. This platform offers malware researchers a highly customizable feature generation process drawing from analysis data reports, particularly those generated in sandbox-based environments such as Cuckoo Sandbox. To evaluate the effectiveness of the platform, a replication of existing studies was conducted in the form of case studies. These studies revealed that the developed platform offers an effective approach that can aid malware detection research. Moreover, a real-world scenario involving over 3000 ransomware and benign samples for ransomware detection based on PE entropy was explored. This yielded an impressive accuracy score of 98.8% and an AUC of 0.97 when employing the decision tree algorithm, with a low latency of 1.51 ms. These results emphasize the necessity of the proposed platform while demonstrating its capacity to construct a comprehensive detection mechanism. By fostering community-driven interactive databanks, this platform enables the creation of datasets as well as the sharing of reports, both of which can substantially reduce experimentation time and enhance research repeatability.
越来越复杂的恶意软件带来了各种各样的挑战,特别是对于那些希望开发机制来阻止这些恶意攻击的安全研究人员来说。虽然安全研究人员已经转向机器学习来对抗恶意软件攻击的激增,并增强检测和预防方法,但他们在寻找恶意软件二进制文件时经常遇到限制。这种限制给恶意软件研究人员增加了负担,他们需要创建特定于上下文的数据集和检测机制,这是一个耗时且复杂的过程,涉及一系列实验。由于缺乏可访问的分析报告和共享和验证发现的集中平台,导致许多研究成果既无法复制也无法验证。为了解决这一关键差距,开发了一个恶意软件分析数据管理平台。该平台为恶意软件研究人员提供了一个高度可定制的特征生成过程,从分析数据报告中绘制,特别是那些在基于沙盒的环境中生成的,如杜鹃沙盒。为了评估该平台的有效性,以案例研究的形式对现有研究进行了复制。这些研究表明,开发的平台提供了一种有效的方法,可以帮助恶意软件检测研究。此外,本文还探讨了一个包含3000多个勒索软件和良性样本的真实场景,用于基于PE熵的勒索软件检测。当使用决策树算法时,这产生了令人印象深刻的98.8%的准确率和0.97的AUC,延迟低至1.51 ms。这些结果强调了所提出的平台的必要性,同时展示了其构建综合检测机制的能力。通过培育社区驱动的交互式数据库,该平台可以创建数据集并共享报告,这两者都可以大大减少实验时间并提高研究的可重复性。
{"title":"MalFe—Malware Feature Engineering Generation Platform","authors":"Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter","doi":"10.3390/computers12100201","DOIUrl":"https://doi.org/10.3390/computers12100201","url":null,"abstract":"The growing sophistication of malware has resulted in diverse challenges, especially among security researchers who are expected to develop mechanisms to thwart these malicious attacks. While security researchers have turned to machine learning to combat this surge in malware attacks and enhance detection and prevention methods, they often encounter limitations when it comes to sourcing malware binaries. This limitation places the burden on malware researchers to create context-specific datasets and detection mechanisms, a time-consuming and intricate process that involves a series of experiments. The lack of accessible analysis reports and a centralized platform for sharing and verifying findings has resulted in many research outputs that can neither be replicated nor validated. To address this critical gap, a malware analysis data curation platform was developed. This platform offers malware researchers a highly customizable feature generation process drawing from analysis data reports, particularly those generated in sandbox-based environments such as Cuckoo Sandbox. To evaluate the effectiveness of the platform, a replication of existing studies was conducted in the form of case studies. These studies revealed that the developed platform offers an effective approach that can aid malware detection research. Moreover, a real-world scenario involving over 3000 ransomware and benign samples for ransomware detection based on PE entropy was explored. This yielded an impressive accuracy score of 98.8% and an AUC of 0.97 when employing the decision tree algorithm, with a low latency of 1.51 ms. These results emphasize the necessity of the proposed platform while demonstrating its capacity to construct a comprehensive detection mechanism. By fostering community-driven interactive databanks, this platform enables the creation of datasets as well as the sharing of reports, both of which can substantially reduce experimentation time and enhance research repeatability.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135199981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1