首页 > 最新文献

Digital Communications and Networks最新文献

英文 中文
Enhancing flexibility and system performance in 6G and beyond: A user-based numerology and waveform approach 增强6G及以上的灵活性和系统性能:基于用户的数字命理学和波形方法
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.020
Mohamed S. Sayed , Hatem M. Zakaria , Abdelhady M. Abdelhady
A Mixed Numerology OFDM (MN-OFDM) system is essential in 6G and beyond. However, it encounters challenges due to Inter-Numerology Interference (INI). The upcoming 6G technology aims to support innovative applications with high data rates, low latency, and reliability. Therefore, effective handling of INI is crucial to meet the diverse requirements of these applications. To address INI in MN-OFDM systems, this paper proposes a User-Based Numerology and Waveform (UBNW) approach that uses various OFDM-based waveforms and their parameters to mitigate INI. By assigning a specific waveform and numerology to each user, UBNW mitigates INI, optimizes service characteristics, and addresses user demands efficiently. The required Guard Bands (GB), expressed as a ratio of user bandwidth, vary significantly across different waveforms at an SIR of 25 dB. For instance, OFDM-FOFDM needs only 2.5%, while OFDM-UFMC, OFDM-WOLA, and conventional OFDM require 7.5%, 24%, and 40%, respectively. The time-frequency efficiency also varies between the waveforms. FOFDM achieves 85.6%, UFMC achieves 81.6%, WOLA achieves 70.7%, and conventional OFDM achieves 66.8%. The simulation results demonstrate that the UBNW approach not only effectively mitigates INI but also enhances system flexibility and time-frequency efficiency while simultaneously reducing the required GB.
混合数字数字OFDM (MN-OFDM)系统在6G及以后是必不可少的。然而,由于数字命理学之间的干扰(INI),它遇到了挑战。即将推出的6G技术旨在支持具有高数据速率、低延迟和可靠性的创新应用。因此,有效地处理INI对于满足这些应用程序的不同需求至关重要。为了解决MN-OFDM系统中的INI,本文提出了一种基于用户的数字和波形(UBNW)方法,该方法使用各种基于ofdm的波形及其参数来缓解INI。通过为每个用户分配特定的波形和数字,UBNW减轻了INI,优化了服务特性,并有效地满足了用户需求。所需的保护带(GB),表示为用户带宽的比率,在25 dB的SIR下,在不同的波形之间变化很大。例如,OFDM- fofdm只需要2.5%,而OFDM- ufmc、OFDM- wola和传统OFDM分别需要7.5%、24%和40%。不同波形的时频效率也不同。FOFDM达到85.6%,UFMC达到81.6%,WOLA达到70.7%,传统OFDM达到66.8%。仿真结果表明,UBNW方法不仅有效地缓解了INI,而且提高了系统的灵活性和时频效率,同时降低了所需的GB。
{"title":"Enhancing flexibility and system performance in 6G and beyond: A user-based numerology and waveform approach","authors":"Mohamed S. Sayed ,&nbsp;Hatem M. Zakaria ,&nbsp;Abdelhady M. Abdelhady","doi":"10.1016/j.dcan.2024.10.020","DOIUrl":"10.1016/j.dcan.2024.10.020","url":null,"abstract":"<div><div>A Mixed Numerology OFDM (MN-OFDM) system is essential in 6G and beyond. However, it encounters challenges due to Inter-Numerology Interference (INI). The upcoming 6G technology aims to support innovative applications with high data rates, low latency, and reliability. Therefore, effective handling of INI is crucial to meet the diverse requirements of these applications. To address INI in MN-OFDM systems, this paper proposes a User-Based Numerology and Waveform (UBNW) approach that uses various OFDM-based waveforms and their parameters to mitigate INI. By assigning a specific waveform and numerology to each user, UBNW mitigates INI, optimizes service characteristics, and addresses user demands efficiently. The required Guard Bands (GB), expressed as a ratio of user bandwidth, vary significantly across different waveforms at an SIR of 25 dB. For instance, OFDM-FOFDM needs only 2.5%, while OFDM-UFMC, OFDM-WOLA, and conventional OFDM require 7.5%, 24%, and 40%, respectively. The time-frequency efficiency also varies between the waveforms. FOFDM achieves 85.6%, UFMC achieves 81.6%, WOLA achieves 70.7%, and conventional OFDM achieves 66.8%. The simulation results demonstrate that the UBNW approach not only effectively mitigates INI but also enhances system flexibility and time-frequency efficiency while simultaneously reducing the required GB.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 975-991"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144925846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VANETs group message secure forwarding with trust evaluation VANETs组消息安全转发与信任评估
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.11.007
Lijun Wang , Huajie Hao , Chun Wang , Xianzhou Han
Efficient and safe information exchange between vehicles can reduce the probability of road accidents, thereby improving the driving experience of vehicles in Vehicular Ad Hoc Networks (VANETs). This paper proposes a group management algorithm with trust and mobility evaluation to address the enormous pressure on VANETs topology caused by high-speed vehicle movement and dynamic changes in the direction of travel. This algorithm utilizes historical interactive data to mine the fusion trust between vehicles. Then, combined with fusion mobility, the selection of center members and information maintenance of group members is achieved. Furthermore, based on bilinear pairing, an encryption protocol is designed to solve the problem of key management and update when the group structure changes rapidly, ensuring the safe forwarding of messages within and between groups. Numerical analysis shows that the algorithm in the paper ensures group stability and improves performance such as average message delivery rate and interaction delay.
车辆之间高效、安全的信息交换可以降低道路事故发生的概率,从而改善车辆在车辆自组织网络(VANETs)中的驾驶体验。针对车辆高速行驶和行驶方向动态变化对VANETs拓扑结构造成的巨大压力,提出了一种具有信任度和机动性评价的群管理算法。该算法利用历史交互数据挖掘车辆间的融合信任。然后结合融合移动性,实现了中心成员的选择和群体成员的信息维护。在此基础上,设计了基于双线性对的加密协议,解决了组结构快速变化时密钥管理和更新的问题,保证了组内和组间消息的安全转发。数值分析表明,本文算法保证了群的稳定性,提高了平均消息传递率和交互延迟等性能。
{"title":"VANETs group message secure forwarding with trust evaluation","authors":"Lijun Wang ,&nbsp;Huajie Hao ,&nbsp;Chun Wang ,&nbsp;Xianzhou Han","doi":"10.1016/j.dcan.2024.11.007","DOIUrl":"10.1016/j.dcan.2024.11.007","url":null,"abstract":"<div><div>Efficient and safe information exchange between vehicles can reduce the probability of road accidents, thereby improving the driving experience of vehicles in Vehicular Ad Hoc Networks (VANETs). This paper proposes a group management algorithm with trust and mobility evaluation to address the enormous pressure on VANETs topology caused by high-speed vehicle movement and dynamic changes in the direction of travel. This algorithm utilizes historical interactive data to mine the fusion trust between vehicles. Then, combined with fusion mobility, the selection of center members and information maintenance of group members is achieved. Furthermore, based on bilinear pairing, an encryption protocol is designed to solve the problem of key management and update when the group structure changes rapidly, ensuring the safe forwarding of messages within and between groups. Numerical analysis shows that the algorithm in the paper ensures group stability and improves performance such as average message delivery rate and interaction delay.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1150-1157"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight consensus mechanisms in the Internet of Blockchained Things: Thorough analysis and research directions 区块链物联网中的轻量级共识机制:深入分析和研究方向
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.12.007
Somia Sahraoui , Abdelmalik Bachir
The Internet of Things (IoT) has gained substantial attention in both academic research and real-world applications. The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services. However, this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats. Consequently, innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed. Recently, the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions, commonly referred to as the Internet of Blockchained Things (IoBT). Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments. Within this context, consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems. The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential. This paper presents a comprehensive examination of lightweight, constraint-aware consensus algorithms tailored for IoBT. The study categorizes these consensus mechanisms based on their core operations, the security of the block validation process, the incorporation of AI techniques, and the specific applications they are designed to support.
物联网(IoT)在学术研究和实际应用中都得到了极大的关注。跨不同领域的互联设备的激增承诺提供智能和先进的服务。然而,这种快速扩张也加剧了物联网生态系统对安全威胁的脆弱性。因此,迫切需要能够有效降低风险,同时适应物联网环境独特限制的创新解决方案。最近,区块链技术和物联网的融合引入了一个分散和强大的框架来保护数据和交互,通常被称为区块链物联网(IoBT)。广泛的研究工作致力于调整区块链技术以满足物联网部署的具体要求。在此背景下,共识算法在评估区块链融入物联网生态系统的可行性方面发挥着关键作用。采用高效和轻量级的共识机制进行区块验证变得越来越重要。本文介绍了为IoBT量身定制的轻量级,约束感知共识算法的全面检查。该研究根据这些共识机制的核心操作、区块验证过程的安全性、人工智能技术的结合以及它们旨在支持的特定应用程序对这些共识机制进行了分类。
{"title":"Lightweight consensus mechanisms in the Internet of Blockchained Things: Thorough analysis and research directions","authors":"Somia Sahraoui ,&nbsp;Abdelmalik Bachir","doi":"10.1016/j.dcan.2024.12.007","DOIUrl":"10.1016/j.dcan.2024.12.007","url":null,"abstract":"<div><div>The Internet of Things (IoT) has gained substantial attention in both academic research and real-world applications. The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services. However, this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats. Consequently, innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed. Recently, the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions, commonly referred to as the Internet of Blockchained Things (IoBT). Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments. Within this context, consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems. The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential. This paper presents a comprehensive examination of lightweight, constraint-aware consensus algorithms tailored for IoBT. The study categorizes these consensus mechanisms based on their core operations, the security of the block validation process, the incorporation of AI techniques, and the specific applications they are designed to support.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1246-1261"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proof-of-trusted-work: A lightweight blockchain consensus for decentralized IoT networks 可信工作证明:分布式物联网网络的轻量级区块链共识
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.011
Pengzhan Jiang , Long Shi , Bin Cao , Taotao Wang , Baofeng Ji , Jun Li
Traditional Internet of Things (IoT) architectures that rely on centralized servers for data management and decision-making are vulnerable to security threats and privacy leakage. To address this issue, blockchain has been advocated for decentralized data management in a tamper-resistance, traceable, and transparent manner. However, a major issue that hinders the integration of blockchain and IoT lies in that, it is rather challenging for resource-constrained IoT devices to perform computation-intensive blockchain consensuses such as Proof-of-Work (PoW). Furthermore, the incentive mechanism of PoW pushes lightweight IoT nodes to aggregate their computing power to increase the possibility of successful block generation. Nevertheless, this eventually leads to the formation of computing power alliances, and significantly compromises the decentralization and security of BlockChain-aided IoT (BC-IoT) networks. To cope with these issues, we propose a lightweight consensus protocol for BC-IoT, called Proof-of-Trusted-Work (PoTW). The goal of the proposed consensus is to disincentivize the centralization of computing power and encourage the independent participation of lightweight IoT nodes in blockchain consensus. First, we put forth an on-chain reputation evaluation rule and a reputation chain for PoTW to enable the verifiability and traceability of nodes' reputations based on their contributions of computing power to the blockchain consensus, and we incorporate the multi-level block generation difficulty as a rewards for nodes to accumulate reputations. Second, we model the block generation process of PoTW and analyze the block throughput using the continuous time Markov chain. Additionally, we define and optimize the relative throughput gain to quantify and maximize the capability of PoTW that suppresses the computing power centralization (i.e., centralization suppression). Furthermore, we investigate the impact of the computing power of the computing power alliance and the levels of block generation difficulty on the centralization suppression capability of PoTW. Finally, simulation results demonstrate the consistency of the analytical results in terms of block throughput. In particular, the results show that PoTW effectively reduces the block generation proportion of the computing power alliance compared with PoW, while simultaneously improving that of individual lightweight nodes. This indicates that PoTW is capable of suppressing the centralization of computing power to a certain degree. Moreover, as the levels of block generation difficulty in PoTW increase, its centralization suppression capability strengthens.
传统的物联网(IoT)架构依赖集中式服务器进行数据管理和决策,容易受到安全威胁和隐私泄露。为了解决这个问题,区块链一直提倡以防篡改、可追踪和透明的方式进行分散的数据管理。然而,阻碍区块链与物联网融合的一个主要问题在于,对于资源受限的物联网设备来说,执行工作量证明(PoW)等计算密集型区块链共识是相当具有挑战性的。此外,PoW的激励机制推动轻量级物联网节点聚集其计算能力,以增加成功生成区块的可能性。然而,这最终导致了计算能力联盟的形成,并严重损害了区块链辅助物联网(BC-IoT)网络的去中心化和安全性。为了解决这些问题,我们提出了一种轻量级的BC-IoT共识协议,称为可信工作证明(pow)。提议共识的目标是抑制计算能力的集中化,并鼓励轻量级物联网节点独立参与区块链共识。首先,我们提出了链上声誉评估规则和pow声誉链,根据节点对区块链共识的计算能力贡献,实现节点声誉的可验证性和可追溯性,并将多级块生成难度作为节点积累声誉的奖励。其次,对pow的区块生成过程进行建模,并利用连续时间马尔可夫链分析区块吞吐量。此外,我们定义并优化了相对吞吐量增益,以量化和最大化PoTW抑制计算能力集中化(即集中化抑制)的能力。此外,我们还研究了算力联盟的算力和区块生成难度对pow中心化抑制能力的影响。最后,仿真结果证明了分析结果在块吞吐量方面的一致性。特别是,结果表明,与PoW相比,PoTW有效地降低了计算能力联盟的块生成比例,同时提高了单个轻量级节点的生成比例。这说明PoTW能够在一定程度上抑制计算能力的集中化。此外,随着区块生成难度等级的增加,PoTW的中心化抑制能力增强。
{"title":"Proof-of-trusted-work: A lightweight blockchain consensus for decentralized IoT networks","authors":"Pengzhan Jiang ,&nbsp;Long Shi ,&nbsp;Bin Cao ,&nbsp;Taotao Wang ,&nbsp;Baofeng Ji ,&nbsp;Jun Li","doi":"10.1016/j.dcan.2024.10.011","DOIUrl":"10.1016/j.dcan.2024.10.011","url":null,"abstract":"<div><div>Traditional Internet of Things (IoT) architectures that rely on centralized servers for data management and decision-making are vulnerable to security threats and privacy leakage. To address this issue, blockchain has been advocated for decentralized data management in a tamper-resistance, traceable, and transparent manner. However, a major issue that hinders the integration of blockchain and IoT lies in that, it is rather challenging for resource-constrained IoT devices to perform computation-intensive blockchain consensuses such as Proof-of-Work (PoW). Furthermore, the incentive mechanism of PoW pushes lightweight IoT nodes to aggregate their computing power to increase the possibility of successful block generation. Nevertheless, this eventually leads to the formation of computing power alliances, and significantly compromises the decentralization and security of BlockChain-aided IoT (BC-IoT) networks. To cope with these issues, we propose a lightweight consensus protocol for BC-IoT, called Proof-of-Trusted-Work (PoTW). The goal of the proposed consensus is to disincentivize the centralization of computing power and encourage the independent participation of lightweight IoT nodes in blockchain consensus. First, we put forth an on-chain reputation evaluation rule and a reputation chain for PoTW to enable the verifiability and traceability of nodes' reputations based on their contributions of computing power to the blockchain consensus, and we incorporate the multi-level block generation difficulty as a rewards for nodes to accumulate reputations. Second, we model the block generation process of PoTW and analyze the block throughput using the continuous time Markov chain. Additionally, we define and optimize the relative throughput gain to quantify and maximize the capability of PoTW that suppresses the computing power centralization (i.e., centralization suppression). Furthermore, we investigate the impact of the computing power of the computing power alliance and the levels of block generation difficulty on the centralization suppression capability of PoTW. Finally, simulation results demonstrate the consistency of the analytical results in terms of block throughput. In particular, the results show that PoTW effectively reduces the block generation proportion of the computing power alliance compared with PoW, while simultaneously improving that of individual lightweight nodes. This indicates that PoTW is capable of suppressing the centralization of computing power to a certain degree. Moreover, as the levels of block generation difficulty in PoTW increase, its centralization suppression capability strengthens.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1055-1066"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient modulation mode recognition based on joint communication parameter estimation in non-cooperative scenarios 非合作场景下基于联合通信参数估计的高效调制模式识别
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.016
Xiangdong Huang , Yimin Wang , Yanping Li , Xiaolei Wang
Due to the neglect of the retrieval of communication parameters (including the symbol rate, the symbol timing offset, and the carrier frequency), the existing non-cooperative communication mode recognizers suffer from the generality ability degradation and severe difficulty in distinguishing a large number of modulation modes, etc. To overcome these drawbacks, this paper proposes an efficient communication mode recognizer consisting of communication parameter estimation, the constellation diagram retrieval, and a classification network. In particular, we define a 2-D symbol synchronization metric to retrieve both the symbol rate and the symbol timing offset, whereas a constellation dispersity annealing procedure is devised to correct the carrier frequency accurately. Owing to the accurate estimation of these crucial parameters, high-regularity constellation maps can be retrieved and thus simplify the subsequent classification work. Numerical results show that the proposed communication mode recognizer acquires higher classification accuracy, stronger anti-noise robustness, and higher applicability of distinguishing multiple types, which presents the proposed scheme with vast applicable potentials in non-cooperative scenarios.
现有的非合作通信模式识别器由于忽略了对通信参数(包括码元速率、码元时序偏移和载波频率)的检索,存在通用性下降、难以识别大量调制模式等问题。为了克服这些缺点,本文提出了一种由通信参数估计、星座图检索和分类网络组成的高效通信模式识别器。特别地,我们定义了一个二维符号同步度量来检索符号速率和符号时间偏移,而设计了一个星座分散退火程序来精确校正载波频率。由于这些关键参数的准确估计,可以检索到高规律性的星座图,从而简化后续的分类工作。数值结果表明,该通信模式识别器具有较高的分类精度、较强的抗噪声鲁棒性和较强的多类型识别适用性,在非合作场景下具有广阔的应用潜力。
{"title":"Efficient modulation mode recognition based on joint communication parameter estimation in non-cooperative scenarios","authors":"Xiangdong Huang ,&nbsp;Yimin Wang ,&nbsp;Yanping Li ,&nbsp;Xiaolei Wang","doi":"10.1016/j.dcan.2024.10.016","DOIUrl":"10.1016/j.dcan.2024.10.016","url":null,"abstract":"<div><div>Due to the neglect of the retrieval of communication parameters (including the symbol rate, the symbol timing offset, and the carrier frequency), the existing non-cooperative communication mode recognizers suffer from the generality ability degradation and severe difficulty in distinguishing a large number of modulation modes, etc. To overcome these drawbacks, this paper proposes an efficient communication mode recognizer consisting of communication parameter estimation, the constellation diagram retrieval, and a classification network. In particular, we define a 2-D symbol synchronization metric to retrieve both the symbol rate and the symbol timing offset, whereas a constellation dispersity annealing procedure is devised to correct the carrier frequency accurately. Owing to the accurate estimation of these crucial parameters, high-regularity constellation maps can be retrieved and thus simplify the subsequent classification work. Numerical results show that the proposed communication mode recognizer acquires higher classification accuracy, stronger anti-noise robustness, and higher applicability of distinguishing multiple types, which presents the proposed scheme with vast applicable potentials in non-cooperative scenarios.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1080-1090"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-chain mapping blockchain: Scalable data management in massive IoT networks 跨链映射区块链:大规模物联网网络中的可扩展数据管理
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.11.001
Wenjian Hu , Yao Yu , Xin Hao , Phee Lep Yeoh , Lei Guo , Yonghui Li
We propose a Cross-Chain Mapping Blockchain (CCMB) for scalable data management in massive Internet of Things (IoT) networks. Specifically, CCMB aims to improve the scalability of securely storing, tracing, and transmitting IoT behavior and reputation data based on our proposed cross-mapped Behavior Chain (BChain) and Reputation Chain (RChain). To improve off-chain IoT data storage scalability, we show that our lightweight CCMB architecture efficiently utilizes available fog-cloud resources. The scalability of on-chain IoT data tracing is enhanced using our Mapping Smart Contract (MSC) and cross-chain mapping design to perform rapid Reputation-to-Behavior (R2B) traceability queries between BChain and RChain blocks. To maximize off-chain to on-chain throughput, we optimize the CCMB block settings and producers based on a general Poisson Point Process (PPP) network model. The constrained optimization problem is formulated as a Markov Decision Process (MDP), and solved using a dual-network Deep Reinforcement Learning (DRL) algorithm. Simulation results validate CCMB's scalability advantages in storage, traceability, and throughput. In specific massive IoT scenarios, CCMB can reduce the storage footprint by 50% and traceability query time by 90%, while improving system throughput by 55% compared to existing benchmarks.
我们提出了一种跨链映射区块链(CCMB),用于大规模物联网(IoT)网络中的可扩展数据管理。具体来说,CCMB旨在提高基于我们提出的交叉映射行为链(BChain)和声誉链(RChain)的安全存储、跟踪和传输物联网行为和声誉数据的可扩展性。为了提高链下物联网数据存储的可扩展性,我们的轻量级CCMB架构有效地利用了可用的雾云资源。使用我们的映射智能合约(MSC)和跨链映射设计来增强链上物联网数据跟踪的可扩展性,以在BChain和RChain块之间执行快速的声誉到行为(R2B)可追溯性查询。为了最大限度地提高链下到链上的吞吐量,我们基于通用泊松点过程(PPP)网络模型优化了CCMB区块设置和生产者。将约束优化问题表述为马尔可夫决策过程(MDP),并采用双网络深度强化学习(DRL)算法求解。仿真结果验证了CCMB在存储、可追溯性和吞吐量方面的可扩展性优势。在特定的大规模物联网场景中,与现有基准相比,CCMB可以将存储空间占用减少50%,可追溯性查询时间减少90%,同时将系统吞吐量提高55%。
{"title":"Cross-chain mapping blockchain: Scalable data management in massive IoT networks","authors":"Wenjian Hu ,&nbsp;Yao Yu ,&nbsp;Xin Hao ,&nbsp;Phee Lep Yeoh ,&nbsp;Lei Guo ,&nbsp;Yonghui Li","doi":"10.1016/j.dcan.2024.11.001","DOIUrl":"10.1016/j.dcan.2024.11.001","url":null,"abstract":"<div><div>We propose a Cross-Chain Mapping Blockchain (CCMB) for scalable data management in massive Internet of Things (IoT) networks. Specifically, CCMB aims to improve the scalability of securely storing, tracing, and transmitting IoT behavior and reputation data based on our proposed cross-mapped Behavior Chain (BChain) and Reputation Chain (RChain). To improve off-chain IoT data storage scalability, we show that our lightweight CCMB architecture efficiently utilizes available fog-cloud resources. The scalability of on-chain IoT data tracing is enhanced using our Mapping Smart Contract (MSC) and cross-chain mapping design to perform rapid Reputation-to-Behavior (R2B) traceability queries between BChain and RChain blocks. To maximize off-chain to on-chain throughput, we optimize the CCMB block settings and producers based on a general Poisson Point Process (PPP) network model. The constrained optimization problem is formulated as a Markov Decision Process (MDP), and solved using a dual-network Deep Reinforcement Learning (DRL) algorithm. Simulation results validate CCMB's scalability advantages in storage, traceability, and throughput. In specific massive IoT scenarios, CCMB can reduce the storage footprint by 50% and traceability query time by 90%, while improving system throughput by 55% compared to existing benchmarks.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1125-1140"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accurate and efficient elephant-flow classification based on co-trained models in evolved software-defined networks 基于协同训练模型的高效象流分类
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.017
Ling Xia Liao , Changqing Zhao , Jian Wang , Roy Xiaorong Lai , Steve Drew
Accurate early classification of elephant flows (elephants) is important for network management and resource optimization. Elephant models, mainly based on the byte count of flows, can always achieve high accuracy, but not in a time-efficient manner. The time efficiency becomes even worse when the flows to be classified are sampled by flow entry timeout over Software-Defined Networks (SDNs) to achieve a better resource efficiency. This paper addresses this situation by combining co-training and Reinforcement Learning (RL) to enable a closed-loop classification approach that divides the entire classification process into episodes, each involving two elephant models. One predicts elephants and is retrained by a selection of flows automatically labeled online by the other. RL is used to formulate a reward function that estimates the values of the possible actions based on the current states of both models and further adjusts the ratio of flows to be labeled in each phase. Extensive evaluation based on real traffic traces shows that the proposed approach can stably predict elephants using the packets received in the first 10% of their lifetime with an accuracy of over 80%, and using only about 10% more control channel bandwidth than the baseline over the evolved SDNs.
大象流的准确早期分类对于网络管理和资源优化具有重要意义。大象模型主要基于流的字节数,总是可以达到很高的准确性,但不是时间效率高的方式。当要分类的流通过软件定义网络(sdn)上的流进入超时进行采样以实现更好的资源效率时,时间效率会变得更差。本文通过结合协同训练和强化学习(RL)来解决这种情况,以实现闭环分类方法,将整个分类过程划分为集,每个集涉及两个大象模型。其中一个预测大象,并通过选择由另一个自动在线标记的流进行再训练。RL用于制定奖励函数,该函数基于两个模型的当前状态估计可能行动的值,并进一步调整每个阶段要标记的流的比例。基于真实流量轨迹的广泛评估表明,所提出的方法可以使用大象生命周期前10%收到的数据包来稳定地预测大象,准确率超过80%,并且使用的控制信道带宽仅比进化的sdn的基线多10%左右。
{"title":"Accurate and efficient elephant-flow classification based on co-trained models in evolved software-defined networks","authors":"Ling Xia Liao ,&nbsp;Changqing Zhao ,&nbsp;Jian Wang ,&nbsp;Roy Xiaorong Lai ,&nbsp;Steve Drew","doi":"10.1016/j.dcan.2024.10.017","DOIUrl":"10.1016/j.dcan.2024.10.017","url":null,"abstract":"<div><div>Accurate early classification of elephant flows (elephants) is important for network management and resource optimization. Elephant models, mainly based on the byte count of flows, can always achieve high accuracy, but not in a time-efficient manner. The time efficiency becomes even worse when the flows to be classified are sampled by flow entry timeout over Software-Defined Networks (SDNs) to achieve a better resource efficiency. This paper addresses this situation by combining co-training and Reinforcement Learning (RL) to enable a closed-loop classification approach that divides the entire classification process into episodes, each involving two elephant models. One predicts elephants and is retrained by a selection of flows automatically labeled online by the other. RL is used to formulate a reward function that estimates the values of the possible actions based on the current states of both models and further adjusts the ratio of flows to be labeled in each phase. Extensive evaluation based on real traffic traces shows that the proposed approach can stably predict elephants using the packets received in the first 10% of their lifetime with an accuracy of over 80%, and using only about 10% more control channel bandwidth than the baseline over the evolved SDNs.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1091-1102"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144925895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-saving control strategy for ultra-dense network base stations based on multi-agent reinforcement learning 基于多智能体强化学习的超密集网络基站节能控制策略
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.015
Yan Zhen , Litianyi Tao , Dapeng Wu , Tong Tang , Ruyan Wang
Aiming at the problem of mobile data traffic surge in 5G networks, this paper proposes an effective solution combining massive multiple-input multiple-output techniques with Ultra-Dense Network (UDN) and focuses on solving the resulting challenge of increased energy consumption. A base station control algorithm based on Multi-Agent Proximity Policy Optimization (MAPPO) is designed. In the constructed 5G UDN model, each base station is considered as an agent, and the MAPPO algorithm enables inter-base station collaboration and interference management to optimize the network performance. To reduce the extra power consumption due to frequent sleep mode switching of base stations, a sleep mode switching decision algorithm is proposed. The algorithm reduces unnecessary power consumption by evaluating the network state similarity and intelligently adjusting the agent's action strategy. Simulation results show that the proposed algorithm reduces the power consumption by 24.61% compared to the no-sleep strategy and further reduces the power consumption by 5.36% compared to the traditional MAPPO algorithm under the premise of guaranteeing the quality of service of users.
针对5G网络中移动数据流量激增的问题,本文提出了海量多输入多输出技术与超密集网络(Ultra-Dense Network, UDN)相结合的有效解决方案,重点解决由此带来的能耗增加的挑战。设计了一种基于多智能体邻近策略优化(MAPPO)的基站控制算法。在构建的5G UDN模型中,将每个基站视为一个agent,通过MAPPO算法实现基站间协作和干扰管理,优化网络性能。为了减少基站频繁切换休眠模式所带来的额外功耗,提出了一种休眠模式切换决策算法。该算法通过评估网络状态相似度和智能调整agent的动作策略来减少不必要的功耗。仿真结果表明,该算法在保证用户服务质量的前提下,比无睡眠策略功耗降低24.61%,比传统MAPPO算法功耗进一步降低5.36%。
{"title":"Energy-saving control strategy for ultra-dense network base stations based on multi-agent reinforcement learning","authors":"Yan Zhen ,&nbsp;Litianyi Tao ,&nbsp;Dapeng Wu ,&nbsp;Tong Tang ,&nbsp;Ruyan Wang","doi":"10.1016/j.dcan.2024.10.015","DOIUrl":"10.1016/j.dcan.2024.10.015","url":null,"abstract":"<div><div>Aiming at the problem of mobile data traffic surge in 5G networks, this paper proposes an effective solution combining massive multiple-input multiple-output techniques with Ultra-Dense Network (UDN) and focuses on solving the resulting challenge of increased energy consumption. A base station control algorithm based on Multi-Agent Proximity Policy Optimization (MAPPO) is designed. In the constructed 5G UDN model, each base station is considered as an agent, and the MAPPO algorithm enables inter-base station collaboration and interference management to optimize the network performance. To reduce the extra power consumption due to frequent sleep mode switching of base stations, a sleep mode switching decision algorithm is proposed. The algorithm reduces unnecessary power consumption by evaluating the network state similarity and intelligently adjusting the agent's action strategy. Simulation results show that the proposed algorithm reduces the power consumption by 24.61% compared to the no-sleep strategy and further reduces the power consumption by 5.36% compared to the traditional MAPPO algorithm under the premise of guaranteeing the quality of service of users.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1007-1017"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A deep-learning-based MAC for integrating channel access, rate adaptation, and channel switch 一种基于深度学习的MAC,用于集成信道访问、速率自适应和信道切换
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.10.010
Jiantao Xin , Wei Xu , Bin Cao , Taotao Wang , Shengli Zhang
With increasing density and heterogeneity in unlicensed wireless networks, traditional MAC protocols, such as Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) in Wi-Fi networks, are experiencing performance degradation. This is manifested in increased collisions and extended backoff times, leading to diminished spectrum efficiency and protocol coordination. Addressing these issues, this paper proposes a deep-learning-based MAC paradigm, dubbed DL-MAC, which leverages spectrum data readily available from energy detection modules in wireless devices to achieve the MAC functionalities of channel access, rate adaptation, and channel switch. First, we utilize DL-MAC to realize a joint design of channel access and rate adaptation. Subsequently, we integrate the capability of channel switching into DL-MAC, enhancing its functionality from single-channel to multi-channel operations. Specifically, the DL-MAC protocol incorporates a Deep Neural Network (DNN) for channel selection and a Recurrent Neural Network (RNN) for the joint design of channel access and rate adaptation. We conducted real-world data collection within the 2.4 GHz frequency band to validate the effectiveness of DL-MAC. Experimental results demonstrate that DL-MAC exhibits significantly superior performance compared to traditional algorithms in both single and multi-channel environments, and also outperforms single-function designs. Additionally, the performance of DL-MAC remains robust, unaffected by channel switch overheads within the evaluation range.
随着非授权无线网络的密度和异构性的增加,传统的MAC协议,如Wi-Fi网络中的载波感知避碰多址(CSMA/CA),正在经历性能下降。这表现在碰撞增加和后退时间延长,导致频谱效率和协议协调降低。为了解决这些问题,本文提出了一种基于深度学习的MAC范式,称为DL-MAC,它利用无线设备中能量检测模块中现成的频谱数据来实现信道接入、速率适应和信道切换的MAC功能。首先,我们利用DL-MAC实现信道接入和速率自适应的联合设计。随后,我们将通道切换功能集成到DL-MAC中,增强了其从单通道到多通道操作的功能。具体来说,DL-MAC协议结合了用于信道选择的深度神经网络(DNN)和用于信道接入和速率自适应联合设计的循环神经网络(RNN)。我们在2.4 GHz频段内进行了实际数据收集,以验证DL-MAC的有效性。实验结果表明,与传统算法相比,DL-MAC在单通道和多通道环境下都表现出显著的性能优势,并且优于单功能设计。此外,DL-MAC的性能保持稳健,在评估范围内不受信道交换开销的影响。
{"title":"A deep-learning-based MAC for integrating channel access, rate adaptation, and channel switch","authors":"Jiantao Xin ,&nbsp;Wei Xu ,&nbsp;Bin Cao ,&nbsp;Taotao Wang ,&nbsp;Shengli Zhang","doi":"10.1016/j.dcan.2024.10.010","DOIUrl":"10.1016/j.dcan.2024.10.010","url":null,"abstract":"<div><div>With increasing density and heterogeneity in unlicensed wireless networks, traditional MAC protocols, such as Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) in Wi-Fi networks, are experiencing performance degradation. This is manifested in increased collisions and extended backoff times, leading to diminished spectrum efficiency and protocol coordination. Addressing these issues, this paper proposes a deep-learning-based MAC paradigm, dubbed DL-MAC, which leverages spectrum data readily available from energy detection modules in wireless devices to achieve the MAC functionalities of channel access, rate adaptation, and channel switch. First, we utilize DL-MAC to realize a joint design of channel access and rate adaptation. Subsequently, we integrate the capability of channel switching into DL-MAC, enhancing its functionality from single-channel to multi-channel operations. Specifically, the DL-MAC protocol incorporates a Deep Neural Network (DNN) for channel selection and a Recurrent Neural Network (RNN) for the joint design of channel access and rate adaptation. We conducted real-world data collection within the 2.4 GHz frequency band to validate the effectiveness of DL-MAC. Experimental results demonstrate that DL-MAC exhibits significantly superior performance compared to traditional algorithms in both single and multi-channel environments, and also outperforms single-function designs. Additionally, the performance of DL-MAC remains robust, unaffected by channel switch overheads within the evaluation range.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1042-1054"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalized spatial modulation detector assisted by reconfigurable intelligent surface based on deep learning 基于深度学习的可重构智能曲面辅助广义空间调制检测器
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1016/j.dcan.2024.11.015
Chiya Zhang , Qinggeng Huang , Chunlong He , Gaojie Chen , Xingquan Li
Reconfigurable Intelligent Surface (RIS) is regarded as a cutting-edge technology for the development of future wireless communication networks with improved frequency efficiency and reduced energy consumption. This paper proposes an architecture by combining RIS with Generalized Spatial Modulation (GSM) and then presents a Multi-Residual Deep Neural Network (MR-DNN) scheme, where the active antennas and their transmitted constellation symbols are detected by sub-DNNs in the detection block. Simulation results demonstrate that the proposed MR-DNN detection algorithm performs considerably better than the traditional Zero-Forcing (ZF) and the Minimum Mean Squared Error (MMSE) detection algorithms in terms of Bit Error Rate (BER). Moreover, the MR-DNN detection algorithm has less time complexity than the traditional detection algorithms.
可重构智能表面(RIS)被认为是未来无线通信网络发展的前沿技术,具有提高频率效率和降低能耗的特点。本文提出了一种将RIS与广义空间调制(GSM)相结合的结构,并在此基础上提出了一种多残差深度神经网络(MR-DNN)方案,该方案通过检测块中的子dnn检测有源天线及其发射星座符号。仿真结果表明,提出的MR-DNN检测算法在误码率(BER)方面明显优于传统的零强迫(Zero-Forcing, ZF)和最小均方误差(Minimum Mean Squared Error, MMSE)检测算法。此外,MR-DNN检测算法比传统检测算法具有更低的时间复杂度。
{"title":"Generalized spatial modulation detector assisted by reconfigurable intelligent surface based on deep learning","authors":"Chiya Zhang ,&nbsp;Qinggeng Huang ,&nbsp;Chunlong He ,&nbsp;Gaojie Chen ,&nbsp;Xingquan Li","doi":"10.1016/j.dcan.2024.11.015","DOIUrl":"10.1016/j.dcan.2024.11.015","url":null,"abstract":"<div><div>Reconfigurable Intelligent Surface (RIS) is regarded as a cutting-edge technology for the development of future wireless communication networks with improved frequency efficiency and reduced energy consumption. This paper proposes an architecture by combining RIS with Generalized Spatial Modulation (GSM) and then presents a Multi-Residual Deep Neural Network (MR-DNN) scheme, where the active antennas and their transmitted constellation symbols are detected by sub-DNNs in the detection block. Simulation results demonstrate that the proposed MR-DNN detection algorithm performs considerably better than the traditional Zero-Forcing (ZF) and the Minimum Mean Squared Error (MMSE) detection algorithms in terms of Bit Error Rate (BER). Moreover, the MR-DNN detection algorithm has less time complexity than the traditional detection algorithms.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"11 4","pages":"Pages 1173-1180"},"PeriodicalIF":7.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144926849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Digital Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1