首页 > 最新文献

Digital Communications and Networks最新文献

英文 中文
A novel handover scheme for millimeter wave network: An approach of integrating reinforcement learning and optimization 一种新的毫米波网络切换方案:一种集成强化学习和优化的方法
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.08.002
Ruiyu Wang , Yao Sun , Chao Zhang , Bowen Yang , Muhammad Imran , Lei Zhang
The millimeter-Wave (mmWave) communication with the advantages of abundant bandwidth and immunity to interference has been deemed a promising technology to greatly improve network capacity. However, due to such characteristics of mmWave, as short transmission distance, high sensitivity to the blockage, and large propagation path loss, handover issues (including trigger condition and target beam selection) become much complicated. In this paper, we design a novel handover scheme to optimize the overall system throughput as well as the total system delay while guaranteeing the Quality of Service (QoS) of each User Equipment (UE). Specifically, the proposed handover scheme called O-MAPPO integrates the Reinforcement Learning (RL) algorithm and optimization theory. The RL algorithm known as Multi-Agent Proximal Policy Optimization (MAPPO) plays a role in determining handover trigger conditions. Further, we propose an optimization problem in conjunction with MAPPO to select the target base station. The aim is to evaluate and optimize the system performance of total throughput and delay while guaranteeing the QoS of each UE after the handover decision is made. The numerical results show the overall system throughput and delay with our method are slightly worse than that with the exhaustive search method but much better than that using another typical RL algorithm Deep Deterministic Policy Gradient (DDPG).
毫米波(mmWave)通信具有带宽大、抗干扰能力强等优点,被认为是一种有望大幅提高网络容量的技术。然而,由于毫米波传输距离短、对阻塞敏感度高、传播路径损耗大等特点,切换问题(包括触发条件和目标波束选择)变得非常复杂。在本文中,我们设计了一种新颖的切换方案,在保证每个用户设备(UE)的服务质量(QoS)的同时,优化整个系统的吞吐量和总系统延迟。具体来说,所提出的名为 O-MAPPO 的切换方案整合了强化学习(RL)算法和优化理论。被称为多代理近端策略优化(MAPPO)的 RL 算法在确定切换触发条件方面发挥了作用。此外,我们还结合 MAPPO 提出了一个优化问题,以选择目标基站。其目的是评估和优化系统的总吞吐量和延迟性能,同时在做出移交决定后保证每个 UE 的 QoS。数值结果表明,采用我们的方法后,系统的总吞吐量和时延比采用穷举搜索法的略差,但比采用另一种典型 RL 算法深度确定性策略梯度(DDPG)的要好得多。
{"title":"A novel handover scheme for millimeter wave network: An approach of integrating reinforcement learning and optimization","authors":"Ruiyu Wang ,&nbsp;Yao Sun ,&nbsp;Chao Zhang ,&nbsp;Bowen Yang ,&nbsp;Muhammad Imran ,&nbsp;Lei Zhang","doi":"10.1016/j.dcan.2023.08.002","DOIUrl":"10.1016/j.dcan.2023.08.002","url":null,"abstract":"<div><div>The millimeter-Wave (mmWave) communication with the advantages of abundant bandwidth and immunity to interference has been deemed a promising technology to greatly improve network capacity. However, due to such characteristics of mmWave, as short transmission distance, high sensitivity to the blockage, and large propagation path loss, handover issues (including trigger condition and target beam selection) become much complicated. In this paper, we design a novel handover scheme to optimize the overall system throughput as well as the total system delay while guaranteeing the Quality of Service (QoS) of each User Equipment (UE). Specifically, the proposed handover scheme called O-MAPPO integrates the Reinforcement Learning (RL) algorithm and optimization theory. The RL algorithm known as Multi-Agent Proximal Policy Optimization (MAPPO) plays a role in determining handover trigger conditions. Further, we propose an optimization problem in conjunction with MAPPO to select the target base station. The aim is to evaluate and optimize the system performance of total throughput and delay while guaranteeing the QoS of each UE after the handover decision is made. The numerical results show the overall system throughput and delay with our method are slightly worse than that with the exhaustive search method but much better than that using another typical RL algorithm Deep Deterministic Policy Gradient (DDPG).</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1493-1502"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41564998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECO++: Adaptive deep feature fusion target tracking method in complex scene 复杂场景下自适应深度特征融合目标跟踪方法
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2022.10.020
Yuhan Liu , He Yan , Qilie Liu , Wei Zhang , Junbin Huang
Efficient Convolution Operator (ECO) algorithms have achieved impressive performances in visual tracking. However, its feature extraction network of ECO is unconducive for capturing the correlation features of occluded and blurred targets between long-range complex scene frames. More so, its fixed weight fusion strategy does not use the complementary properties of deep and shallow features. In this paper, we propose a new target tracking method, namely ECO++, using deep feature adaptive fusion in a complex scene, in the following two aspects: First, we constructed a new temporal convolution mode and used it to replace the underlying convolution layer in Conformer network to obtain an improved Conformer network. Second, we adaptively fuse the deep features, which output through the improved Conformer network, by combining the Peak to Sidelobe Ratio (PSR), frame smoothness scores and adaptive adjustment weight. Extensive experiments on the OTB-2013, OTB-2015, UAV123, and VOT2019 benchmarks demonstrate that the proposed approach outperforms the state-of-the-art algorithms in tracking accuracy and robustness in complex scenes with occluded, blurred, and fast-moving targets.
高效卷积算子(Efficient Convolution Operator,ECO)算法在视觉跟踪方面取得了令人瞩目的成就。然而,ECO 算法的特征提取网络无法捕捉远距离复杂场景帧之间的遮挡和模糊目标的相关特征。此外,其固定权重融合策略也没有利用深层和浅层特征的互补性。本文从以下两个方面提出了一种在复杂场景中使用深层特征自适应融合的新型目标跟踪方法,即 ECO++:首先,我们构建了一种新的时空卷积模式,并用它来替换 Conformer 网络中的底层卷积层,从而得到一种改进的 Conformer 网络。其次,我们结合峰值与边框比(PSR)、帧平滑度得分和自适应调整权重,对通过改进的 Conformer 网络输出的深度特征进行自适应融合。在 OTB-2013、OTB-2015、UAV123 和 VOT2019 基准上进行的广泛实验表明,在目标遮挡、模糊和快速移动的复杂场景中,所提出的方法在跟踪精度和鲁棒性方面优于最先进的算法。
{"title":"ECO++: Adaptive deep feature fusion target tracking method in complex scene","authors":"Yuhan Liu ,&nbsp;He Yan ,&nbsp;Qilie Liu ,&nbsp;Wei Zhang ,&nbsp;Junbin Huang","doi":"10.1016/j.dcan.2022.10.020","DOIUrl":"10.1016/j.dcan.2022.10.020","url":null,"abstract":"<div><div>Efficient Convolution Operator (ECO) algorithms have achieved impressive performances in visual tracking. However, its feature extraction network of ECO is unconducive for capturing the correlation features of occluded and blurred targets between long-range complex scene frames. More so, its fixed weight fusion strategy does not use the complementary properties of deep and shallow features. In this paper, we propose a new target tracking method, namely ECO++, using deep feature adaptive fusion in a complex scene, in the following two aspects: First, we constructed a new temporal convolution mode and used it to replace the underlying convolution layer in Conformer network to obtain an improved Conformer network. Second, we adaptively fuse the deep features, which output through the improved Conformer network, by combining the Peak to Sidelobe Ratio (PSR), frame smoothness scores and adaptive adjustment weight. Extensive experiments on the OTB-2013, OTB-2015, UAV123, and VOT2019 benchmarks demonstrate that the proposed approach outperforms the state-of-the-art algorithms in tracking accuracy and robustness in complex scenes with occluded, blurred, and fast-moving targets.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1352-1364"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43434686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An autoencoder-based feature level fusion for speech emotion recognition 基于自动编码器的语音情感识别特征级融合
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2022.10.018
Peng Shixin, Chen Kai, Tian Tian, Chen Jingying
Although speech emotion recognition is challenging, it has broad application prospects in human-computer interaction. Building a system that can accurately and stably recognize emotions from human languages can provide a better user experience. However, the current unimodal emotion feature representations are not distinctive enough to accomplish the recognition, and they do not effectively simulate the inter-modality dynamics in speech emotion recognition tasks. This paper proposes a multimodal method that utilizes both audio and semantic content for speech emotion recognition. The proposed method consists of three parts: two high-level feature extractors for text and audio modalities, and an autoencoder-based feature fusion. For audio modality, we propose a structure called Temporal Global Feature Extractor (TGFE) to extract the high-level features of the time-frequency domain relationship from the original speech signal. Considering that text lacks frequency information, we use only a Bidirectional Long Short-Term Memory network (BLSTM) and attention mechanism to simulate an intra-modal dynamic. Once these steps have been accomplished, the high-level text and audio features are sent to the autoencoder in parallel to learn their shared representation for final emotion classification. We conducted extensive experiments on three public benchmark datasets to evaluate our method. The results on Interactive Emotional Motion Capture (IEMOCAP) and Multimodal EmotionLines Dataset (MELD) outperform the existing method. Additionally, the results of CMU Multi-modal Opinion-level Sentiment Intensity (CMU-MOSI) are competitive. Furthermore, experimental results show that compared to unimodal information and autoencoder-based feature level fusion, the joint multimodal information (audio and text) improves the overall performance and can achieve greater accuracy than simple feature concatenation.
尽管语音情感识别具有挑战性,但它在人机交互领域却有着广阔的应用前景。建立一个能从人类语言中准确、稳定地识别情感的系统,能为用户提供更好的体验。然而,目前的单模态情感特征表征不够鲜明,无法有效模拟语音情感识别任务中的跨模态动态。本文提出了一种利用音频和语义内容进行语音情感识别的多模态方法。该方法由三部分组成:两个用于文本和音频模式的高级特征提取器,以及一个基于自动编码器的特征融合器。对于音频模式,我们提出了一种名为时域全局特征提取器(TGFE)的结构,用于从原始语音信号中提取时频域关系的高级特征。考虑到文本缺乏频率信息,我们仅使用双向长短期记忆网络(BLSTM)和注意力机制来模拟模态内动态。完成这些步骤后,高级文本和音频特征将并行发送给自动编码器,以学习它们的共享表示,从而进行最终的情感分类。我们在三个公共基准数据集上进行了广泛的实验,以评估我们的方法。交互式情感动作捕捉(IEMOCAP)和多模态情感线数据集(MELD)的结果优于现有方法。此外,CMU 多模态意见级情感强度(CMU-MOSI)的结果也很有竞争力。此外,实验结果表明,与单模态信息和基于自动编码器的特征级融合相比,联合多模态信息(音频和文本)提高了整体性能,比简单的特征串联获得更高的准确性。
{"title":"An autoencoder-based feature level fusion for speech emotion recognition","authors":"Peng Shixin,&nbsp;Chen Kai,&nbsp;Tian Tian,&nbsp;Chen Jingying","doi":"10.1016/j.dcan.2022.10.018","DOIUrl":"10.1016/j.dcan.2022.10.018","url":null,"abstract":"<div><div>Although speech emotion recognition is challenging, it has broad application prospects in human-computer interaction. Building a system that can accurately and stably recognize emotions from human languages can provide a better user experience. However, the current unimodal emotion feature representations are not distinctive enough to accomplish the recognition, and they do not effectively simulate the inter-modality dynamics in speech emotion recognition tasks. This paper proposes a multimodal method that utilizes both audio and semantic content for speech emotion recognition. The proposed method consists of three parts: two high-level feature extractors for text and audio modalities, and an autoencoder-based feature fusion. For audio modality, we propose a structure called Temporal Global Feature Extractor (TGFE) to extract the high-level features of the time-frequency domain relationship from the original speech signal. Considering that text lacks frequency information, we use only a Bidirectional Long Short-Term Memory network (BLSTM) and attention mechanism to simulate an intra-modal dynamic. Once these steps have been accomplished, the high-level text and audio features are sent to the autoencoder in parallel to learn their shared representation for final emotion classification. We conducted extensive experiments on three public benchmark datasets to evaluate our method. The results on Interactive Emotional Motion Capture (IEMOCAP) and Multimodal EmotionLines Dataset (MELD) outperform the existing method. Additionally, the results of CMU Multi-modal Opinion-level Sentiment Intensity (CMU-MOSI) are competitive. Furthermore, experimental results show that compared to unimodal information and autoencoder-based feature level fusion, the joint multimodal information (audio and text) improves the overall performance and can achieve greater accuracy than simple feature concatenation.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1341-1351"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47336974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving authentication scheme based on zero trust architecture 基于零信任体系结构的隐私保护认证方案
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.01.021
Fei Tang , Chunliang Ma , Kefei Cheng
Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication, access control, dynamic evaluation, and so on. This work focuses on authentication technology in the zero trust network. In this paper, a Traceable Universal Designated Verifier Signature (TUDVS) is used to construct a privacy-preserving authentication scheme for zero trust architecture. Specifically, when a client requests access to server resources, we want to protect the client's access privacy which means that the server administrator cannot disclose the client's access behavior to any third party. In addition, the security of the proposed scheme is proved and its efficiency is analyzed. Finally, TUDVS is applied to the single packet authorization scenario of the zero trust architecture to prove the practicability of the proposed scheme.
零信任架构是一种端到端的服务器资源和数据安全方法,包括身份验证、访问控制、动态评估等。这项工作的重点是零信任网络中的身份验证技术。本文采用可追溯通用指定验证签名(TUDVS)来构建零信任架构的隐私保护认证方案。具体来说,当客户端请求访问服务器资源时,我们希望保护客户端的访问隐私,即服务器管理员不能向任何第三方泄露客户端的访问行为。此外,我们还证明了所提方案的安全性,并分析了其效率。最后,将 TUDVS 应用于零信任架构的单个数据包授权场景,以证明所提方案的实用性。
{"title":"Privacy-preserving authentication scheme based on zero trust architecture","authors":"Fei Tang ,&nbsp;Chunliang Ma ,&nbsp;Kefei Cheng","doi":"10.1016/j.dcan.2023.01.021","DOIUrl":"10.1016/j.dcan.2023.01.021","url":null,"abstract":"<div><div>Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication, access control, dynamic evaluation, and so on. This work focuses on authentication technology in the zero trust network. In this paper, a Traceable Universal Designated Verifier Signature (TUDVS) is used to construct a privacy-preserving authentication scheme for zero trust architecture. Specifically, when a client requests access to server resources, we want to protect the client's access privacy which means that the server administrator cannot disclose the client's access behavior to any third party. In addition, the security of the proposed scheme is proved and its efficiency is analyzed. Finally, TUDVS is applied to the single packet authorization scenario of the zero trust architecture to prove the practicability of the proposed scheme.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1211-1220"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46147599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A learning automata based edge resource allocation approach for IoT-enabled smart cities 基于学习自动机的物联网智能城市边缘资源分配方法
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.11.009
Sampa Sahoo , Kshira Sagar Sahoo , Bibhudatta Sahoo , Amir H. Gandomi
The development of the Internet of Things (IoT) technology is leading to a new era of smart applications such as smart transportation, buildings, and smart homes. Moreover, these applications act as the building blocks of IoT-enabled smart cities. The high volume and high velocity of data generated by various smart city applications are sent to flexible and efficient cloud computing resources for processing. However, there is a high computation latency due to the presence of a remote cloud server. Edge computing, which brings the computation close to the data source is introduced to overcome this problem. In an IoT-enabled smart city environment, one of the main concerns is to consume the least amount of energy while executing tasks that satisfy the delay constraint. An efficient resource allocation at the edge is helpful to address this issue. In this paper, an energy and delay minimization problem in a smart city environment is formulated as a bi-objective edge resource allocation problem. First, we presented a three-layer network architecture for IoT-enabled smart cities. Then, we designed a learning automata-based edge resource allocation approach considering the three-layer network architecture to solve the said bi-objective minimization problem. Learning Automata (LA) is a reinforcement-based adaptive decision-maker that helps to find the best task and edge resource mapping. An extensive set of simulations is performed to demonstrate the applicability and effectiveness of the LA-based approach in the IoT-enabled smart city environment.
物联网(IoT)技术的发展正在引领智能交通、楼宇和智能家居等智能应用进入新时代。此外,这些应用还是物联网智能城市的基石。各种智慧城市应用产生的大量高速数据被发送到灵活高效的云计算资源进行处理。然而,由于远程云服务器的存在,计算延迟较高。为了解决这个问题,我们引入了边缘计算,它能使计算接近数据源。在启用了物联网的智慧城市环境中,主要关注点之一是在执行满足延迟约束的任务时消耗最少的能源。边缘的高效资源分配有助于解决这一问题。本文将智能城市环境中的能量和延迟最小化问题表述为一个双目标边缘资源分配问题。首先,我们介绍了物联网智能城市的三层网络架构。然后,考虑到三层网络架构,我们设计了一种基于学习自动机的边缘资源分配方法,以解决上述双目标最小化问题。学习自动机(LA)是一种基于强化的自适应决策制定器,有助于找到最佳任务和边缘资源映射。为了证明基于 LA 的方法在物联网智能城市环境中的适用性和有效性,我们进行了大量的模拟。
{"title":"A learning automata based edge resource allocation approach for IoT-enabled smart cities","authors":"Sampa Sahoo ,&nbsp;Kshira Sagar Sahoo ,&nbsp;Bibhudatta Sahoo ,&nbsp;Amir H. Gandomi","doi":"10.1016/j.dcan.2023.11.009","DOIUrl":"10.1016/j.dcan.2023.11.009","url":null,"abstract":"<div><div>The development of the Internet of Things (IoT) technology is leading to a new era of smart applications such as smart transportation, buildings, and smart homes. Moreover, these applications act as the building blocks of IoT-enabled smart cities. The high volume and high velocity of data generated by various smart city applications are sent to flexible and efficient cloud computing resources for processing. However, there is a high computation latency due to the presence of a remote cloud server. Edge computing, which brings the computation close to the data source is introduced to overcome this problem. In an IoT-enabled smart city environment, one of the main concerns is to consume the least amount of energy while executing tasks that satisfy the delay constraint. An efficient resource allocation at the edge is helpful to address this issue. In this paper, an energy and delay minimization problem in a smart city environment is formulated as a bi-objective edge resource allocation problem. First, we presented a three-layer network architecture for IoT-enabled smart cities. Then, we designed a learning automata-based edge resource allocation approach considering the three-layer network architecture to solve the said bi-objective minimization problem. Learning Automata (LA) is a reinforcement-based adaptive decision-maker that helps to find the best task and edge resource mapping. An extensive set of simulations is performed to demonstrate the applicability and effectiveness of the LA-based approach in the IoT-enabled smart city environment.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1258-1266"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139021138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiency-optimized 6G: A virtual network resource orchestration strategy by enhanced particle swarm optimization 效率优化的6G:一种基于增强粒子群优化的虚拟网络资源协调策略
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.06.008
Sai Zou , Junrui Wu , Haisheng Yu , Wenyong Wang , Lisheng Huang , Wei Ni , Yan Liu
The future Sixth-Generation (6G) wireless systems are expected to encounter emerging services with diverse requirements. In this paper, 6G network resource orchestration is optimized to support customized network slicing of services, and place network functions generated by heterogeneous devices into available resources. This is a combinatorial optimization problem that is solved by developing a Particle Swarm Optimization (PSO) based scheduling strategy with enhanced inertia weight, particle variation, and nonlinear learning factor, thereby balancing the local and global solutions and improving the convergence speed to globally near-optimal solutions. Simulations show that the method improves the convergence speed and the utilization of network resources compared with other variants of PSO.
未来的第六代(6G)无线系统预计会遇到具有不同需求的新兴服务。本文对 6G 网络资源协调进行了优化,以支持业务的定制网络切片,并将异构设备生成的网络功能放到可用资源中。这是一个组合优化问题,通过开发一种基于粒子群优化(PSO)的调度策略来解决这个问题,该策略具有增强的惯性权重、粒子变化和非线性学习因子,从而平衡了局部解和全局解,并提高了全局近似最优解的收敛速度。模拟结果表明,与 PSO 的其他变体相比,该方法提高了收敛速度和网络资源利用率。
{"title":"Efficiency-optimized 6G: A virtual network resource orchestration strategy by enhanced particle swarm optimization","authors":"Sai Zou ,&nbsp;Junrui Wu ,&nbsp;Haisheng Yu ,&nbsp;Wenyong Wang ,&nbsp;Lisheng Huang ,&nbsp;Wei Ni ,&nbsp;Yan Liu","doi":"10.1016/j.dcan.2023.06.008","DOIUrl":"10.1016/j.dcan.2023.06.008","url":null,"abstract":"<div><div>The future Sixth-Generation (6G) wireless systems are expected to encounter emerging services with diverse requirements. In this paper, 6G network resource orchestration is optimized to support customized network slicing of services, and place network functions generated by heterogeneous devices into available resources. This is a combinatorial optimization problem that is solved by developing a Particle Swarm Optimization (PSO) based scheduling strategy with enhanced inertia weight, particle variation, and nonlinear learning factor, thereby balancing the local and global solutions and improving the convergence speed to globally near-optimal solutions. Simulations show that the method improves the convergence speed and the utilization of network resources compared with other variants of PSO.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1221-1233"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46688400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LOS and NLOS identification in real indoor environment using deep learning approach 使用深度学习方法识别真实室内环境中的直瞄和非直瞄
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.05.009
Alicja Olejniczak, Olga Blaszkiewicz, Krzysztof K. Cwalina, Piotr Rajchowski, Jaroslaw Sadowski
Visibility conditions between antennas, i.e. Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) can be crucial in the context of indoor localization, for which detecting the NLOS condition and further correcting constant position estimation errors or allocating resources can reduce the negative influence of multipath propagation on wireless communication and positioning. In this paper a Deep Learning (DL) model to classify LOS/NLOS condition while analyzing two Channel Impulse Response (CIR) parameters: Total Power (TP) [dBm] and First Path Power (FP) [dBm] is proposed. The experiments were conducted using DWM1000 DecaWave radio module based on measurements collected in a real indoor environment and the proposed architecture provides LOS/NLOS identification with an accuracy of more than 100% and 95% in static and dynamic senarios, respectively. The proposed model improves the classification rate by 2-5% compared to other Machine Learning (ML) methods proposed in the literature.
天线之间的可见度条件,即视距(Line-of-Sight,LOS)和非视距(Non-Line-of-Sight,NLOS),在室内定位中至关重要,为此,检测 NLOS 条件并进一步修正恒定位置估计误差或分配资源,可以减少多径传播对无线通信和定位的负面影响。本文采用深度学习(DL)模型对 LOS/NLOS 条件进行分类,同时分析两个信道脉冲响应(CIR)参数:总功率 (TP) [dBm] 和第一路径功率 (FP) [dBm] 。实验使用 DWM1000 DecaWave 无线电模块进行,基于在真实室内环境中收集到的测量数据,在静态和动态情况下,所提出的架构提供的 LOS/NLOS 识别准确率分别超过 100%和 95%。与文献中提出的其他机器学习(ML)方法相比,所提模型的分类率提高了 2-5%。
{"title":"LOS and NLOS identification in real indoor environment using deep learning approach","authors":"Alicja Olejniczak,&nbsp;Olga Blaszkiewicz,&nbsp;Krzysztof K. Cwalina,&nbsp;Piotr Rajchowski,&nbsp;Jaroslaw Sadowski","doi":"10.1016/j.dcan.2023.05.009","DOIUrl":"10.1016/j.dcan.2023.05.009","url":null,"abstract":"<div><div>Visibility conditions between antennas, i.e. Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) can be crucial in the context of indoor localization, for which detecting the NLOS condition and further correcting constant position estimation errors or allocating resources can reduce the negative influence of multipath propagation on wireless communication and positioning. In this paper a Deep Learning (DL) model to classify LOS/NLOS condition while analyzing two Channel Impulse Response (CIR) parameters: Total Power (TP) [dBm] and First Path Power (FP) [dBm] is proposed. The experiments were conducted using DWM1000 DecaWave radio module based on measurements collected in a real indoor environment and the proposed architecture provides LOS/NLOS identification with an accuracy of more than 100% and 95% in static and dynamic senarios, respectively. The proposed model improves the classification rate by 2-5% compared to other Machine Learning (ML) methods proposed in the literature.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1305-1312"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49035926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IRS-enabled NOMA communication systems: A network architecture primer with future trends and challenges 支持 IRS 的 NOMA 通信系统:网络架构入门与未来趋势和挑战
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.09.002
Haleema Sadia , Ahmad Kamal Hassan , Ziaul Haq Abbas , Ghulam Abbas , Muhammad Waqas , Zhu Han
Non-Orthogonal Multiple Access (NOMA) has already proven to be an effective multiple access scheme for 5th Generation (5G) wireless networks. It provides improved performance in terms of system throughput, spectral efficiency, fairness, and energy efficiency (EE). However, in conventional NOMA networks, performance degradation still exists because of the stochastic behavior of wireless channels. To combat this challenge, the concept of Intelligent Reflecting Surface (IRS) has risen to prominence as a low-cost intelligent solution for Beyond 5G (B5G) networks. In this paper, a modeling primer based on the integration of these two cutting-edge technologies, i.e., IRS and NOMA, for B5G wireless networks is presented. An in-depth comparative analysis of IRS-assisted Power Domain (PD)-NOMA networks is provided through 3-fold investigations. First, a primer is presented on the system architecture of IRS-enabled multiple-configuration PD-NOMA systems, and parallels are drawn with conventional network configurations, i.e., conventional NOMA, Orthogonal Multiple Access (OMA), and IRS-assisted OMA networks. Followed by this, a comparative analysis of these network configurations is showcased in terms of significant performance metrics, namely, individual users' achievable rate, sum rate, ergodic rate, EE, and outage probability. Moreover, for multi-antenna IRS-enabled NOMA networks, we exploit the active Beamforming (BF) technique by employing a greedy algorithm using a state-of-the-art branch-reduce-and-bound (BRB) method. The optimality of the BRB algorithm is presented by comparing it with benchmark BF techniques, i.e., minimum-mean-square-error, zero-forcing-BF, and maximum-ratio-transmission. Furthermore, we present an outlook on future envisioned NOMA networks, aided by IRSs, i.e., with a variety of potential applications for 6G wireless networks. This work presents a generic performance assessment toolkit for wireless networks, focusing on IRS-assisted NOMA networks. This comparative analysis provides a solid foundation for the development of future IRS-enabled, energy-efficient wireless communication systems.
非正交多址接入(NOMA)已被证明是第五代(5G)无线网络的有效多址接入方案。它在系统吞吐量、频谱效率、公平性和能效(EE)方面提供了更好的性能。然而,在传统的 NOMA 网络中,由于无线信道的随机行为,仍然存在性能下降的问题。为了应对这一挑战,智能反射面(IRS)的概念作为一种面向超 5G (B5G)网络的低成本智能解决方案而备受瞩目。本文介绍了基于这两种前沿技术(即 IRS 和 NOMA)集成的 B5G 无线网络建模入门。本文从三个方面对 IRS 辅助功率域 (PD) -NOMA 网络进行了深入的比较分析。首先,介绍了支持 IRS 的多配置 PD-NOMA 系统的系统架构,并将其与传统网络配置(即传统 NOMA、正交多址 (OMA) 和 IRS 辅助 OMA 网络)进行了比较。随后,从重要的性能指标(即单个用户的可实现速率、总和速率、遍历速率、EE 和中断概率)方面对这些网络配置进行了比较分析。此外,对于支持多天线 IRS 的 NOMA 网络,我们通过采用最先进的分支-还原-约束(BRB)方法的贪婪算法,利用了主动波束成形(BF)技术。通过与基准波束成形技术(即最小均方误差技术、零强迫波束成形技术和最大比率传输技术)进行比较,我们展示了 BRB 算法的最优性。此外,我们还展望了由 IRS 辅助的未来 NOMA 网络,即在 6G 无线网络中的各种潜在应用。这项工作为无线网络提供了一个通用性能评估工具包,重点关注 IRS 辅助的 NOMA 网络。这种比较分析为未来开发支持 IRS 的高能效无线通信系统奠定了坚实的基础。
{"title":"IRS-enabled NOMA communication systems: A network architecture primer with future trends and challenges","authors":"Haleema Sadia ,&nbsp;Ahmad Kamal Hassan ,&nbsp;Ziaul Haq Abbas ,&nbsp;Ghulam Abbas ,&nbsp;Muhammad Waqas ,&nbsp;Zhu Han","doi":"10.1016/j.dcan.2023.09.002","DOIUrl":"10.1016/j.dcan.2023.09.002","url":null,"abstract":"<div><div>Non-Orthogonal Multiple Access (NOMA) has already proven to be an effective multiple access scheme for 5th Generation (5G) wireless networks. It provides improved performance in terms of system throughput, spectral efficiency, fairness, and energy efficiency (EE). However, in conventional NOMA networks, performance degradation still exists because of the stochastic behavior of wireless channels. To combat this challenge, the concept of Intelligent Reflecting Surface (IRS) has risen to prominence as a low-cost intelligent solution for Beyond 5G (B5G) networks. In this paper, a modeling primer based on the integration of these two cutting-edge technologies, i.e., IRS and NOMA, for B5G wireless networks is presented. An in-depth comparative analysis of IRS-assisted Power Domain (PD)-NOMA networks is provided through 3-fold investigations. First, a primer is presented on the system architecture of IRS-enabled multiple-configuration PD-NOMA systems, and parallels are drawn with conventional network configurations, i.e., conventional NOMA, Orthogonal Multiple Access (OMA), and IRS-assisted OMA networks. Followed by this, a comparative analysis of these network configurations is showcased in terms of significant performance metrics, namely, individual users' achievable rate, sum rate, ergodic rate, EE, and outage probability. Moreover, for multi-antenna IRS-enabled NOMA networks, we exploit the active Beamforming (BF) technique by employing a greedy algorithm using a state-of-the-art branch-reduce-and-bound (BRB) method. The optimality of the BRB algorithm is presented by comparing it with benchmark BF techniques, i.e., minimum-mean-square-error, zero-forcing-BF, and maximum-ratio-transmission. Furthermore, we present an outlook on future envisioned NOMA networks, aided by IRSs, i.e., with a variety of potential applications for 6G wireless networks. This work presents a generic performance assessment <em>toolkit</em> for wireless networks, focusing on IRS-assisted NOMA networks. This comparative analysis provides a solid foundation for the development of future IRS-enabled, energy-efficient wireless communication systems.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1503-1528"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135347605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure data rate maximization for full-duplex UAV-enabled base station 全双工无人机基站的安全数据速率最大化
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2022.11.012
Chunlong He , Xinjie Li , Yin Huang , Jianzhen Lin , Gongbin Qian , Xingquan Li
Unmanned Aerial Vehicle (UAV) is an air base station featuring flexible deployment and mobility. It can significantly improve the communication quality of the system due to its line-of-sight channel connection with ground devices. However, due to the openness of UAV-to-Ground channels, the communication between ground users’ devices and UAV is easily eavesdropped. In this paper, we aim to improve the security of communication system by using full-duplex UAV as a mobile air base station. The UAV sends interference signals to eavesdroppers and receives signals from ground devices. We jointly optimize the scheduling between the UAV and ground devices, the transmission power of the UAV and ground devices, as well as the trajectory of the UAV to maximize the minimum average security communication data rate. This optimization problem is mixed with integers and non-convex expressions. Therefore, this problem is not a standard convex optimization problem, which can not be solved with standard methods. With this in mind, we propose an effective algorithm which solves this problem iteratively by applying Successive Convex Approximation (SCA), variable relaxation and substitution. Finally, numerical results demonstrate the effectiveness of the proposed algorithm.
无人飞行器(UAV)是一种空中基站,具有部署灵活、机动性强的特点。由于其与地面设备的视距信道连接,可以大大提高系统的通信质量。然而,由于无人机对地面信道的开放性,地面用户设备与无人机之间的通信很容易被窃听。本文旨在利用全双工无人机作为移动空中基站,提高通信系统的安全性。无人机向窃听者发送干扰信号,并接收来自地面设备的信号。我们共同优化无人机和地面设备之间的调度、无人机和地面设备的发射功率以及无人机的飞行轨迹,以最大限度地提高平均安全通信数据率。这个优化问题混合了整数和非凸表达式。因此,这个问题不是一个标准的凸优化问题,无法用标准方法解决。有鉴于此,我们提出了一种有效的算法,通过应用连续凸近似(SCA)、变量松弛和置换来迭代解决该问题。最后,数值结果证明了所提算法的有效性。
{"title":"Secure data rate maximization for full-duplex UAV-enabled base station","authors":"Chunlong He ,&nbsp;Xinjie Li ,&nbsp;Yin Huang ,&nbsp;Jianzhen Lin ,&nbsp;Gongbin Qian ,&nbsp;Xingquan Li","doi":"10.1016/j.dcan.2022.11.012","DOIUrl":"10.1016/j.dcan.2022.11.012","url":null,"abstract":"<div><div>Unmanned Aerial Vehicle (UAV) is an air base station featuring flexible deployment and mobility. It can significantly improve the communication quality of the system due to its line-of-sight channel connection with ground devices. However, due to the openness of UAV-to-Ground channels, the communication between ground users’ devices and UAV is easily eavesdropped. In this paper, we aim to improve the security of communication system by using full-duplex UAV as a mobile air base station. The UAV sends interference signals to eavesdroppers and receives signals from ground devices. We jointly optimize the scheduling between the UAV and ground devices, the transmission power of the UAV and ground devices, as well as the trajectory of the UAV to maximize the minimum average security communication data rate. This optimization problem is mixed with integers and non-convex expressions. Therefore, this problem is not a standard convex optimization problem, which can not be solved with standard methods. With this in mind, we propose an effective algorithm which solves this problem iteratively by applying Successive Convex Approximation (SCA), variable relaxation and substitution. Finally, numerical results demonstrate the effectiveness of the proposed algorithm.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1387-1393"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46434399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing 粒度分类器:基于粒度计算构建加密流量分类的流量粒度
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2022.12.017
Xuyang Jing , Jingjing Zhao , Zheng Yan , Witold Pedrycz , Xian Li
Accurate classification of encrypted traffic plays an important role in network management. However, current methods confronts several problems: inability to characterize traffic that exhibits great dispersion, inability to classify traffic with multi-level features, and degradation due to limited training traffic size. To address these problems, this paper proposes a traffic granularity-based cryptographic traffic classification method, called Granular Classifier (GC). In this paper, a novel Cardinality-based Constrained Fuzzy C-Means (CCFCM) clustering algorithm is proposed to address the problem caused by limited training traffic, considering the ratio of cardinality that must be linked between flows to achieve good traffic partitioning. Then, an original representation format of traffic is presented based on granular computing, named Traffic Granules (TG), to accurately describe traffic structure by catching the dispersion of different traffic features. Each granule is a compact set of similar data with a refined boundary by excluding outliers. Based on TG, GC is constructed to perform traffic classification based on multi-level features. The performance of the GC is evaluated based on real-world encrypted network traffic data. Experimental results show that the GC achieves outstanding performance for encrypted traffic classification with limited size of training traffic and keeps accurate classification in dynamic network conditions.
加密流量的准确分类在网络管理中发挥着重要作用。然而,目前的方法面临着几个问题:无法表征分散性很强的流量、无法对具有多级特征的流量进行分类,以及由于训练流量规模有限而导致的性能下降。为了解决这些问题,本文提出了一种基于流量粒度的加密流量分类方法,称为粒度分类器(GC)。本文提出了一种新颖的基于卡片度的受限模糊 C-Means (CCFCM)聚类算法,以解决因训练流量有限而导致的问题,该算法考虑了流量之间必须联系的卡片度比例,以实现良好的流量分区。然后,提出了一种基于粒度计算的流量原始表示格式,命名为流量粒度(TG),通过捕捉不同流量特征的分散性来准确描述流量结构。每个颗粒都是一组相似数据的紧凑集合,并通过排除异常值细化了边界。在 TG 的基础上,GC 被构建为基于多层次特征的交通分类。基于真实世界的加密网络流量数据,对 GC 的性能进行了评估。实验结果表明,在训练流量规模有限的情况下,GC 在加密流量分类方面表现出色,并能在动态网络条件下保持分类的准确性。
{"title":"Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing","authors":"Xuyang Jing ,&nbsp;Jingjing Zhao ,&nbsp;Zheng Yan ,&nbsp;Witold Pedrycz ,&nbsp;Xian Li","doi":"10.1016/j.dcan.2022.12.017","DOIUrl":"10.1016/j.dcan.2022.12.017","url":null,"abstract":"<div><div>Accurate classification of encrypted traffic plays an important role in network management. However, current methods confronts several problems: inability to characterize traffic that exhibits great dispersion, inability to classify traffic with multi-level features, and degradation due to limited training traffic size. To address these problems, this paper proposes a traffic granularity-based cryptographic traffic classification method, called Granular Classifier (GC). In this paper, a novel Cardinality-based Constrained Fuzzy C-Means (CCFCM) clustering algorithm is proposed to address the problem caused by limited training traffic, considering the ratio of cardinality that must be linked between flows to achieve good traffic partitioning. Then, an original representation format of traffic is presented based on granular computing, named Traffic Granules (TG), to accurately describe traffic structure by catching the dispersion of different traffic features. Each granule is a compact set of similar data with a refined boundary by excluding outliers. Based on TG, GC is constructed to perform traffic classification based on multi-level features. The performance of the GC is evaluated based on real-world encrypted network traffic data. Experimental results show that the GC achieves outstanding performance for encrypted traffic classification with limited size of training traffic and keeps accurate classification in dynamic network conditions.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1428-1438"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44647460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Digital Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1