首页 > 最新文献

Pervasive and Mobile Computing最新文献

英文 中文
A controllability method on the social Internet of Things (SIoT) network 社会物联网(SIoT)网络的可控性方法
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-26 DOI: 10.1016/j.pmcj.2024.101992
In recent years, one type of complex network called the Social Internet of Things (SIoT) has attracted the attention of researchers. Controllability is one of the important problems in complex networks and it has essential applications in social, biological, and technical networks. Applying this problem can also play an important role in the control of social smart cities, but it has not yet been defined as a specific problem on SIoT, and no solution has been provided for it. This paper addresses the controllability problem of the temporal SIoT network. In this regard, first, a definition for the temporal SIoT network is provided. Then, the unique relationships of this network are defined and modeled formally. In the following, the Controllability problem is applied to the temporal SIoT network (CSIoT) to identify the Minimum Driver nodes Set (MDS). Then proposed CSIoT is compared with the state-of-the-art methods for performance analysis. In the obtained results, the heterogeneity (different types, brands, and models) has been investigated. Also, 69.80 % of the SIoT sub-graphs nodes have been identified as critical driver nodes in 152 different sets. The proposed controllability deals with network control in a distributed manner.
近年来,一种名为社会物联网(SIoT)的复杂网络引起了研究人员的关注。可控性是复杂网络的重要问题之一,在社会、生物和技术网络中都有重要应用。应用这一问题在社会智慧城市的控制中也能发挥重要作用,但它尚未被定义为 SIoT 的一个具体问题,也没有提供解决方案。本文探讨了时空 SIoT 网络的可控性问题。首先,本文给出了时空 SIoT 网络的定义。然后,对该网络的独特关系进行正式定义和建模。接下来,将可控性问题应用于时态 SIoT 网络(CSIoT),以确定最小驱动节点集(MDS)。然后,将提出的 CSIoT 与最先进的性能分析方法进行比较。在所得结果中,对异质性(不同类型、品牌和型号)进行了调查。此外,在 152 个不同的集合中,69.80% 的 SIoT 子图节点被确定为关键驱动节点。所提出的可控性以分布式方式处理网络控制。
{"title":"A controllability method on the social Internet of Things (SIoT) network","authors":"","doi":"10.1016/j.pmcj.2024.101992","DOIUrl":"10.1016/j.pmcj.2024.101992","url":null,"abstract":"<div><div>In recent years, one type of complex network called the Social Internet of Things (SIoT) has attracted the attention of researchers. Controllability is one of the important problems in complex networks and it has essential applications in social, biological, and technical networks. Applying this problem can also play an important role in the control of social smart cities, but it has not yet been defined as a specific problem on SIoT, and no solution has been provided for it. This paper addresses the controllability problem of the temporal SIoT network. In this regard, first, a definition for the temporal SIoT network is provided. Then, the unique relationships of this network are defined and modeled formally. In the following, the Controllability problem is applied to the temporal SIoT network (CSIoT) to identify the Minimum Driver nodes Set (MDS). Then proposed CSIoT is compared with the state-of-the-art methods for performance analysis. In the obtained results, the heterogeneity (different types, brands, and models) has been investigated. Also, 69.80 % of the SIoT sub-graphs nodes have been identified as critical driver nodes in 152 different sets. The proposed controllability deals with network control in a distributed manner.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INLEC: An involutive and low energy lightweight block cipher for internet of things INLEC: 适用于物联网的非连续低能耗轻量级区块密码
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-23 DOI: 10.1016/j.pmcj.2024.101991
The Internet of Things (IoT) has emerged as a pivotal force in the global technological revolution and industrial transformation. Despite its advancements, IoT devices continue to face significant security challenges, particularly during data transmission, and are often constrained by limited battery life and energy resources. To address these challenges, a low energy lightweight block cipher (INLEC) is proposed to mitigate data leakage in IoT devices. In addition, the Structure and Components INvolution (SCIN) design is introduced. It is constructed using two similar round functions to achieve front–back symmetry. This design ensures coherence throughout the INLEC encryption and decryption processes and addresses the increased resource consumption during the decryption phase in Substitution Permutation Networks (SPN). Furthermore, a low area S-box is generated through a hardware gate-level circuit search method combined with Genetic Programming (GP). This optimization leads to a 47.02% reduction in area compared to the S0 of Midori, using UMC 0.18μm technology. Moreover, a chaotic function is used to generate the optimal nibble-based involutive permutation, further enhancing its efficiency. In terms of performs, the energy consumption for both encryption and decryption with INLEC is 6.88 μJ/bit, representing 25.21% reduction compared to Midori. Finally, INLEC is implemented using STM32L475 PanDuoLa and Nexys A7 FPGA development boards, establishing an encryption platform for IoT devices. This platform provides functions for data acquisition, transmission, and encryption.
物联网(IoT)已成为全球技术革命和产业转型的关键力量。尽管物联网技术不断进步,但物联网设备仍然面临着巨大的安全挑战,尤其是在数据传输过程中,而且往往受到有限的电池寿命和能源资源的限制。为了应对这些挑战,我们提出了一种低能耗的轻量级区块密码(INLEC),以减少物联网设备中的数据泄漏。此外,还介绍了结构和组件 INvolution(SCIN)设计。它使用两个相似的轮函数来实现前后对称。这种设计确保了 INLEC 加密和解密过程的一致性,并解决了置换置换网络(SPN)解密阶段资源消耗增加的问题。此外,通过结合遗传编程(GP)的硬件门级电路搜索方法生成了低面积 S-box。与 Midori 的 S0 相比,采用 0.18μm UMC 技术的这一优化方案可减少 47.02% 的面积。此外,还使用混沌函数生成基于 nibble 的最佳渐开线排列,进一步提高了效率。在性能方面,INLEC 的加密和解密能耗均为 6.88 μJ/bit,与 Midori 相比降低了 25.21%。最后,INLEC 利用 STM32L475 PanDuoLa 和 Nexys A7 FPGA 开发板实现,为物联网设备建立了一个加密平台。该平台提供数据采集、传输和加密功能。
{"title":"INLEC: An involutive and low energy lightweight block cipher for internet of things","authors":"","doi":"10.1016/j.pmcj.2024.101991","DOIUrl":"10.1016/j.pmcj.2024.101991","url":null,"abstract":"<div><div>The Internet of Things (IoT) has emerged as a pivotal force in the global technological revolution and industrial transformation. Despite its advancements, IoT devices continue to face significant security challenges, particularly during data transmission, and are often constrained by limited battery life and energy resources. To address these challenges, a low energy lightweight block cipher (INLEC) is proposed to mitigate data leakage in IoT devices. In addition, the Structure and Components INvolution (SCIN) design is introduced. It is constructed using two similar round functions to achieve front–back symmetry. This design ensures coherence throughout the INLEC encryption and decryption processes and addresses the increased resource consumption during the decryption phase in Substitution Permutation Networks (SPN). Furthermore, a low area S-box is generated through a hardware gate-level circuit search method combined with Genetic Programming (GP). This optimization leads to a 47.02% reduction in area compared to the <span><math><msub><mrow><mi>S</mi></mrow><mrow><mn>0</mn></mrow></msub></math></span> of Midori, using UMC <span><math><mrow><mn>0</mn><mo>.</mo><mn>18</mn><mspace></mspace><mi>μ</mi><mi>m</mi></mrow></math></span> technology. Moreover, a chaotic function is used to generate the optimal nibble-based involutive permutation, further enhancing its efficiency. In terms of performs, the energy consumption for both encryption and decryption with INLEC is 6.88 <span><math><mi>μ</mi></math></span>J/bit, representing 25.21% reduction compared to Midori. Finally, INLEC is implemented using STM32L475 PanDuoLa and Nexys A7 FPGA development boards, establishing an encryption platform for IoT devices. This platform provides functions for data acquisition, transmission, and encryption.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142318676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pressure distribution based 2D in-bed keypoint prediction under interfered scenes 干扰场景下基于压力分布的二维床内关键点预测
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-20 DOI: 10.1016/j.pmcj.2024.101979
In-bed pose estimation holds significant potential in various domains, including healthcare, sleep studies, and smart homes. Pressure-sensitive bed sheets have emerged as a promising solution for addressing this task considering the advantages of convenience, comfort, and privacy protection. However, existing studies primarily rely on ideal datasets that do not consider the presence of common daily objects such as pillows and quilts referred to as interference, which can significantly impact the pressure distribution. As a result, there is still a gap between the models trained with ideal data and the real-life application. Besides the end-to-end training approach, one potential solution is to recognize the interference and fuse the interference information to the model during training. In this study, we created a well-annotated dataset, consisting of eight in-bed scenes and four common types of interference: pillows, quilts, a laptop, and a package. To facilitate the analysis, the pixels in the pressure image were categorized into five classes based on the relative position between the interference and the human. We then evaluated the performance of five neural network models for pixel-level interference recognition. The best-performing model achieved an accuracy of 80.0% in recognizing the five categories. Subsequently, we validated the utility of interference recognition in improving pose estimation accuracy. The ideal model initially shows an average joint position error of up to 30.59 cm and a Percentage of Correct Keypoints (PCK) of 0.332 on data from scenes with interferences. After retraining on data including interference, the error is reduced to 13.54 cm and the PCK increases to 0.747. By integrating interference recognition information, either by excluding the parts of the interference or using the recognition results as input, the error can be further minimized to 12.44 cm and the PCK can be maximized up to 0.777. Our findings represent an initial step towards the practical deployment of pressure-sensitive bed sheets in everyday life.
床上姿势估计在医疗保健、睡眠研究和智能家居等多个领域都具有巨大潜力。压敏床单具有方便、舒适和保护隐私等优点,已成为解决这一任务的理想解决方案。然而,现有研究主要依赖于理想数据集,没有考虑到枕头和棉被等日常常见物体的存在,这些物体被称为干扰,会对压力分布产生重大影响。因此,用理想数据训练的模型与实际应用之间仍存在差距。除了端到端训练方法,一种潜在的解决方案是识别干扰,并在训练过程中将干扰信息融合到模型中。在本研究中,我们创建了一个经过精心标注的数据集,其中包括八个床上场景和四种常见的干扰类型:枕头、棉被、笔记本电脑和包裹。为了便于分析,我们根据干扰与人体之间的相对位置将压力图像中的像素分为五类。然后,我们评估了像素级干扰识别的五个神经网络模型的性能。表现最好的模型在识别五个类别方面的准确率达到了 80.0%。随后,我们验证了干扰识别在提高姿态估计精度方面的实用性。在有干扰的场景数据上,理想模型最初显示的平均联合位置误差高达 30.59 厘米,关键点正确率 (PCK) 为 0.332。在对包含干扰的数据进行再训练后,误差降至 13.54 厘米,关键点正确率增至 0.747。通过整合干扰识别信息,或排除干扰部分,或将识别结果作为输入,误差可进一步减小到 12.44 厘米,PCK 可最大化到 0.777。我们的研究结果标志着压敏床单在日常生活中的实际应用迈出了第一步。
{"title":"Pressure distribution based 2D in-bed keypoint prediction under interfered scenes","authors":"","doi":"10.1016/j.pmcj.2024.101979","DOIUrl":"10.1016/j.pmcj.2024.101979","url":null,"abstract":"<div><div>In-bed pose estimation holds significant potential in various domains, including healthcare, sleep studies, and smart homes. Pressure-sensitive bed sheets have emerged as a promising solution for addressing this task considering the advantages of convenience, comfort, and privacy protection. However, existing studies primarily rely on ideal datasets that do not consider the presence of common daily objects such as pillows and quilts referred to as interference, which can significantly impact the pressure distribution. As a result, there is still a gap between the models trained with ideal data and the real-life application. Besides the end-to-end training approach, one potential solution is to recognize the interference and fuse the interference information to the model during training. In this study, we created a well-annotated dataset, consisting of eight in-bed scenes and four common types of interference: pillows, quilts, a laptop, and a package. To facilitate the analysis, the pixels in the pressure image were categorized into five classes based on the relative position between the interference and the human. We then evaluated the performance of five neural network models for pixel-level interference recognition. The best-performing model achieved an accuracy of 80.0% in recognizing the five categories. Subsequently, we validated the utility of interference recognition in improving pose estimation accuracy. The ideal model initially shows an average joint position error of up to 30.59 cm and a Percentage of Correct Keypoints (PCK) of 0.332 on data from scenes with interferences. After retraining on data including interference, the error is reduced to 13.54 cm and the PCK increases to 0.747. By integrating interference recognition information, either by excluding the parts of the interference or using the recognition results as input, the error can be further minimized to 12.44 cm and the PCK can be maximized up to 0.777. Our findings represent an initial step towards the practical deployment of pressure-sensitive bed sheets in everyday life.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142314386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application 区块链增强型高效匿名无证书签名方案及其应用
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-19 DOI: 10.1016/j.pmcj.2024.101990
Although the Internet of Things (IoT) brings efficiency and convenience to various aspects of people’s lives, security and privacy concerns persist as significant challenges. Certificateless Signatures eliminate digital certificate management and key escrow issues and can be well embedded in resource-constrained IoT devices for secure access control. Recently, Ma et al. designed an efficient and pair-free certificateless signature (CLS) scheme for IoT deployment. Unfortunately, We demonstrate that the scheme proposed by Ma et al. is susceptible to signature forgery attacks by Type-II adversaries. That is, a malicious-and-passive key generation center (KGC) can forge a legitimate signature for any message by modifying the system parameters without the user’s secret value. Therefore, their identity authentication scheme designed based on vehicular ad-hoc networks also cannot guarantee the claimed security. To address the security vulnerabilities, we designed a blockchain-enhanced and anonymous CLS scheme and proved its security under the Elliptic curve discrete logarithm (ECDL) hardness assumption. Compared to similar schemes, our enhanced scheme offers notable advantages in computational efficiency and communication overhead, as well as stronger security. In addition, a mutual authentication scheme that satisfies the cross-domain scenario is proposed to facilitate efficient mutual authentication and negotiated session key generation between smart devices and edge servers in different edge networks. Performance evaluation shows that our protocol achieves an effective trade-off between security and compute performance, with better applicability in IoT scenarios.
尽管物联网(IoT)为人们生活的各个方面带来了效率和便利,但安全和隐私问题仍然是重大挑战。无证书签名消除了数字证书管理和密钥托管问题,可以很好地嵌入到资源有限的物联网设备中,实现安全访问控制。最近,Ma 等人为物联网部署设计了一种高效、无配对的无证书签名(CLS)方案。不幸的是,我们证明了 Ma 等人提出的方案容易受到第二类对手的签名伪造攻击。也就是说,恶意和被动的密钥生成中心(KGC)可以通过修改系统参数,在没有用户秘密值的情况下伪造任何信息的合法签名。因此,他们基于车载 ad-hoc 网络设计的身份验证方案也无法保证所宣称的安全性。针对这些安全漏洞,我们设计了一种区块链增强匿名 CLS 方案,并在椭圆曲线离散对数(ECDL)硬度假设下证明了其安全性。与类似方案相比,我们的增强方案在计算效率和通信开销方面具有显著优势,而且安全性更强。此外,我们还提出了一种满足跨域场景的相互验证方案,以促进不同边缘网络中智能设备与边缘服务器之间的高效相互验证和协商会话密钥生成。性能评估表明,我们的协议在安全性和计算性能之间实现了有效权衡,在物联网场景中具有更好的适用性。
{"title":"Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application","authors":"","doi":"10.1016/j.pmcj.2024.101990","DOIUrl":"10.1016/j.pmcj.2024.101990","url":null,"abstract":"<div><div>Although the Internet of Things (IoT) brings efficiency and convenience to various aspects of people’s lives, security and privacy concerns persist as significant challenges. Certificateless Signatures eliminate digital certificate management and key escrow issues and can be well embedded in resource-constrained IoT devices for secure access control. Recently, Ma et al. designed an efficient and pair-free certificateless signature (CLS) scheme for IoT deployment. Unfortunately, We demonstrate that the scheme proposed by Ma et al. is susceptible to signature forgery attacks by Type-II adversaries. That is, a malicious-and-passive key generation center (KGC) can forge a legitimate signature for any message by modifying the system parameters without the user’s secret value. Therefore, their identity authentication scheme designed based on vehicular ad-hoc networks also cannot guarantee the claimed security. To address the security vulnerabilities, we designed a blockchain-enhanced and anonymous CLS scheme and proved its security under the Elliptic curve discrete logarithm (ECDL) hardness assumption. Compared to similar schemes, our enhanced scheme offers notable advantages in computational efficiency and communication overhead, as well as stronger security. In addition, a mutual authentication scheme that satisfies the cross-domain scenario is proposed to facilitate efficient mutual authentication and negotiated session key generation between smart devices and edge servers in different edge networks. Performance evaluation shows that our protocol achieves an effective trade-off between security and compute performance, with better applicability in IoT scenarios.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142318677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can smartphones serve as an instrument for driver behavior of intelligent transportation systems research? A systematic review: Challenges, motivations, and recommendations 智能手机能否作为智能交通系统研究的驾驶员行为工具?系统综述:挑战、动机和建议
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.1016/j.pmcj.2024.101978
The increasing number of road accidents is a major issue in many countries. Studying drivers’ behaviour is essential to identify the key factors of these accidents. As improving sustainability can be reached by improving driving behaviour, this study aimed to review and thoroughly analyse current driver behaviour literature that focuses on smartphones and attempted to provide an understanding of various contextual fields in published studies through different open challenges encountered and recommendations to enhance this vital area. All articles about driver behaviour with the scope of using smartphone were searched systematically in four main databases, namely, IEEE Xplore, ScienceDirect, Scopus and Web of Science, from 2013 to 2023. The final set of 207 articles matched our inclusion and exclusion criteria. The basic characteristics of this emerging field are identified from the aspects of motivations, open challenges that impede the technology's utility, authors’ recommendations and substantial analysis of the previous studies are discussed based on five aspects (sample size, developed software, techniques used, smartphone sensor based and, available datasets). A proposed research methodology as new direction is provided to solve the gaps identified in the analysis. As a case study of the proposed methodology, the area of eco-driving behaviour is selected to address the current gaps in this area and assist in advancing it. This systematic review is expected to open opportunities for researchers and encourage them to work on the identified gaps.
道路交通事故日益增多是许多国家面临的一个重大问题。研究驾驶员的行为对于找出这些事故的关键因素至关重要。通过改善驾驶行为可以提高可持续性,因此本研究旨在回顾和全面分析当前以智能手机为重点的驾驶行为文献,并试图通过所遇到的不同公开挑战和加强这一重要领域的建议,提供对已发表研究中各种背景领域的理解。研究人员在四个主要数据库(IEEE Xplore、ScienceDirect、Scopus 和 Web of Science)中系统地检索了从 2013 年到 2023 年所有关于使用智能手机的驾驶员行为的文章。最终有 207 篇文章符合我们的纳入和排除标准。我们从动机、阻碍技术实用性的公开挑战、作者建议等方面确定了这一新兴领域的基本特征,并根据五个方面(样本量、开发的软件、使用的技术、基于智能手机传感器和可用数据集)讨论了对以往研究的实质性分析。为解决分析中发现的问题,作者提出了一种新的研究方法。作为建议方法的案例研究,选择了生态驾驶行为领域,以解决该领域目前存在的差距,并协助推进该领域的研究。本系统性综述有望为研究人员提供机会,鼓励他们针对发现的差距开展工作。
{"title":"Can smartphones serve as an instrument for driver behavior of intelligent transportation systems research? A systematic review: Challenges, motivations, and recommendations","authors":"","doi":"10.1016/j.pmcj.2024.101978","DOIUrl":"10.1016/j.pmcj.2024.101978","url":null,"abstract":"<div><div>The increasing number of road accidents is a major issue in many countries. Studying drivers’ behaviour is essential to identify the key factors of these accidents. As improving sustainability can be reached by improving driving behaviour, this study aimed to review and thoroughly analyse current driver behaviour literature that focuses on smartphones and attempted to provide an understanding of various contextual fields in published studies through different open challenges encountered and recommendations to enhance this vital area. All articles about driver behaviour with the scope of using smartphone were searched systematically in four main databases, namely, IEEE Xplore, ScienceDirect, Scopus and Web of Science, from 2013 to 2023. The final set of 207 articles matched our inclusion and exclusion criteria. The basic characteristics of this emerging field are identified from the aspects of motivations, open challenges that impede the technology's utility, authors’ recommendations and substantial analysis of the previous studies are discussed based on five aspects (sample size, developed software, techniques used, smartphone sensor based and, available datasets). A proposed research methodology as new direction is provided to solve the gaps identified in the analysis. As a case study of the proposed methodology, the area of eco-driving behaviour is selected to address the current gaps in this area and assist in advancing it. This systematic review is expected to open opportunities for researchers and encourage them to work on the identified gaps.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142312552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep reinforcement learning based mobility management in a MEC-Enabled cellular IoT network 支持 MEC 的蜂窝物联网网络中基于深度强化学习的移动性管理
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-13 DOI: 10.1016/j.pmcj.2024.101987
Mobile Edge Computing (MEC) has paved the way for new Cellular Internet of Things (CIoT) paradigm, where resource constrained CIoT Devices (CDs) can offload tasks to a computing server located at either a Base Station (BS) or an edge node. For CDs moving in high speed, seamless mobility is crucial during the MEC service migration from one base station (BS) to another. In this paper, we investigate the problem of joint power allocation and Handover (HO) management in a MEC network with a Deep Reinforcement Learning (DRL) approach. To handle the hybrid action space (continuous: power allocation and discrete: HO decision), we leverage Parameterized Deep Q-Network (P-DQN) to learn the near-optimal solution. Simulation results illustrate that the proposed algorithm (P-DQN) outperforms the conventional approaches, such as the nearest BS +random power and random BS +random power, in terms of reward, HO cost, and total power consumption. According to simulation results, HO occurs almost in the edge point of two BS, which means the HO is almost perfectly managed. In addition, the total power consumption is around 0.151 watts in P-DQN while it is about 0.75 watts in nearest BS +random power and random BS +random power.
移动边缘计算(MEC)为新的蜂窝物联网(CIoT)模式铺平了道路,在这种模式下,资源有限的 CIoT 设备(CD)可以将任务卸载到位于基站(BS)或边缘节点的计算服务器上。对于高速移动的 CD,在从一个基站(BS)向另一个基站(BS)迁移 MEC 服务的过程中,无缝移动至关重要。本文采用深度强化学习(DRL)方法研究了 MEC 网络中的联合功率分配和切换(HO)管理问题。为了处理混合行动空间(连续:功率分配和离散:HO 决策),我们利用参数化深度 Q 网络(P-DQN)来学习接近最优的解决方案。仿真结果表明,拟议算法(P-DQN)在奖励、HO 成本和总功耗方面优于最近 BS + 随机功率和随机 BS + 随机功率等传统方法。根据仿真结果,HO 几乎发生在两个 BS 的边缘点,这意味着 HO 几乎得到了完美的管理。此外,P-DQN 的总功耗约为 0.151 瓦,而最近 BS + 随机功率和随机 BS + 随机功率的总功耗约为 0.75 瓦。
{"title":"Deep reinforcement learning based mobility management in a MEC-Enabled cellular IoT network","authors":"","doi":"10.1016/j.pmcj.2024.101987","DOIUrl":"10.1016/j.pmcj.2024.101987","url":null,"abstract":"<div><div>Mobile Edge Computing (MEC) has paved the way for new Cellular Internet of Things (CIoT) paradigm, where resource constrained CIoT Devices (CDs) can offload tasks to a computing server located at either a Base Station (BS) or an edge node. For CDs moving in high speed, seamless mobility is crucial during the MEC service migration from one base station (BS) to another. In this paper, we investigate the problem of joint power allocation and Handover (HO) management in a MEC network with a Deep Reinforcement Learning (DRL) approach. To handle the hybrid action space (continuous: power allocation and discrete: HO decision), we leverage Parameterized Deep Q-Network (P-DQN) to learn the near-optimal solution. Simulation results illustrate that the proposed algorithm (P-DQN) outperforms the conventional approaches, such as the nearest BS +random power and random BS +random power, in terms of reward, HO cost, and total power consumption. According to simulation results, HO occurs almost in the edge point of two BS, which means the HO is almost perfectly managed. In addition, the total power consumption is around 0.151 watts in P-DQN while it is about 0.75 watts in nearest BS +random power and random BS +random power.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142312699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security protocol for securing notifications about dangerous events in the agglomeration 确保集聚区危险事件通知安全的安全协议
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-11 DOI: 10.1016/j.pmcj.2024.101977

Our everyday lives cannot function without intelligent devices, which create the so-called Internet of Things networks. Internet of Things devices have various sensors and software to manage the work environment and perform specific tasks without human intervention. Internet of Things networks require appropriate security at various levels of their operation. In this article, we present a new security protocol that protects communication in IoT networks and enables interconnected devices to communicate and exchange information to increase the security of people living in urban agglomerations. The Control Station device evaluates the collected data about events that may threaten the life or health of residents and then notifies the Emergency Notification Center about it. The protocol guarantees the security of devices and transmitted data. We verified this using automatic verification technology, formal verification using Burrows, Abadi and Needham logic and informal analysis. The proposed protocol ensures mutual authentication, anonymity and revocation. Also, it is resistant to Man-in-the-middle, modification, replay and impersonation attacks. Compared to other protocols, our solution uses simple cryptographic techniques that are lightweight, stable and do not cause problems related to high communication costs. It does not require specialist equipment, so we can implement it using typical hardware. At each stage of protocol execution, communication occurs between two entities, so it does not require interaction between different entities, which may limit its adaptability in the context of interoperability.

我们的日常生活离不开智能设备,这些智能设备形成了所谓的物联网网络。物联网设备拥有各种传感器和软件,可在无人干预的情况下管理作业环境并执行特定任务。物联网网络在运行的各个层面都需要适当的安全性。在本文中,我们介绍了一种新的安全协议,它可以保护物联网网络中的通信,并使互联设备能够通信和交换信息,从而提高城市群中居民的安全。控制站设备对收集到的可能威胁居民生命或健康的事件数据进行评估,然后通知紧急通知中心。该协议可确保设备和传输数据的安全性。我们利用自动验证技术、使用 Burrows、Abadi 和 Needham 逻辑的正式验证以及非正式分析验证了这一点。所提出的协议可确保相互验证、匿名和撤销。此外,它还能抵御中间人攻击、修改攻击、重放攻击和冒充攻击。与其他协议相比,我们的解决方案使用了简单的加密技术,这些技术轻便、稳定,而且不会产生与高通信成本相关的问题。它不需要专业设备,因此我们可以使用一般的硬件来实现它。在协议执行的每个阶段,通信都发生在两个实体之间,因此它不需要不同实体之间的交互,这可能会限制其在互操作性方面的适应性。
{"title":"Security protocol for securing notifications about dangerous events in the agglomeration","authors":"","doi":"10.1016/j.pmcj.2024.101977","DOIUrl":"10.1016/j.pmcj.2024.101977","url":null,"abstract":"<div><p>Our everyday lives cannot function without intelligent devices, which create the so-called Internet of Things networks. Internet of Things devices have various sensors and software to manage the work environment and perform specific tasks without human intervention. Internet of Things networks require appropriate security at various levels of their operation. In this article, we present a new security protocol that protects communication in IoT networks and enables interconnected devices to communicate and exchange information to increase the security of people living in urban agglomerations. The Control Station device evaluates the collected data about events that may threaten the life or health of residents and then notifies the Emergency Notification Center about it. The protocol guarantees the security of devices and transmitted data. We verified this using automatic verification technology, formal verification using Burrows, Abadi and Needham logic and informal analysis. The proposed protocol ensures mutual authentication, anonymity and revocation. Also, it is resistant to Man-in-the-middle, modification, replay and impersonation attacks. Compared to other protocols, our solution uses simple cryptographic techniques that are lightweight, stable and do not cause problems related to high communication costs. It does not require specialist equipment, so we can implement it using typical hardware. At each stage of protocol execution, communication occurs between two entities, so it does not require interaction between different entities, which may limit its adaptability in the context of interoperability.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224001020/pdfft?md5=3cef85ebf780a1e504204af1828772d5&pid=1-s2.0-S1574119224001020-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142242827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-aware human activity recognition for wearable devices: A comprehensive review 可穿戴设备的能量感知人类活动识别:综合评述
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-02 DOI: 10.1016/j.pmcj.2024.101976

With the rapid advancement of wearable devices, sensor-based human activity recognition has emerged as a fundamental research area with broad applications in various domains. While significant progress has been made in this research field, energy consumption remains a critical aspect that deserves special attention. Recognizing human activities while optimizing energy consumption is essential for prolonging device battery life, reducing charging frequency, and ensuring uninterrupted monitoring and functionality.

The primary objective of this survey paper is to provide a comprehensive review of energy-aware wearable human activity recognition techniques based on wearable sensors without considering vision-based systems. In particular, it aims to explore the state-of-the-art approaches and methodologies that integrate activity recognition with energy management strategies. Finally, by surveying the existing literature, this paper aims to shed light on the challenges, opportunities and potential solutions for energy-aware human activity recognition.

随着可穿戴设备的快速发展,基于传感器的人类活动识别已成为一个基础研究领域,在各个领域都有广泛的应用。虽然这一研究领域已经取得了重大进展,但能耗仍然是一个值得特别关注的关键问题。在识别人类活动的同时优化能耗,对于延长设备电池寿命、降低充电频率、确保不间断监控和功能性至关重要。本调查论文的主要目的是全面综述基于可穿戴传感器的能量感知可穿戴人类活动识别技术,而不考虑基于视觉的系统。本文的主要目的是对基于可穿戴传感器的能量感知可穿戴人体活动识别技术进行全面综述,而不考虑基于视觉的系统。本文尤其旨在探讨将活动识别与能量管理策略相结合的最新方法和手段。最后,通过对现有文献的调查,本文旨在阐明能量感知人类活动识别的挑战、机遇和潜在解决方案。
{"title":"Energy-aware human activity recognition for wearable devices: A comprehensive review","authors":"","doi":"10.1016/j.pmcj.2024.101976","DOIUrl":"10.1016/j.pmcj.2024.101976","url":null,"abstract":"<div><p>With the rapid advancement of wearable devices, sensor-based human activity recognition has emerged as a fundamental research area with broad applications in various domains. While significant progress has been made in this research field, energy consumption remains a critical aspect that deserves special attention. Recognizing human activities while optimizing energy consumption is essential for prolonging device battery life, reducing charging frequency, and ensuring uninterrupted monitoring and functionality.</p><p>The primary objective of this survey paper is to provide a comprehensive review of energy-aware wearable human activity recognition techniques based on wearable sensors without considering vision-based systems. In particular, it aims to explore the state-of-the-art approaches and methodologies that integrate activity recognition with energy management strategies. Finally, by surveying the existing literature, this paper aims to shed light on the challenges, opportunities and potential solutions for energy-aware human activity recognition.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119224001019/pdfft?md5=3a75aef0c582dd105ddf3b32830e2e31&pid=1-s2.0-S1574119224001019-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerating the neural network controller embedded implementation on FPGA with novel dropout techniques for a solar inverter 利用新型剔除技术加速太阳能逆变器神经网络控制器在 FPGA 上的嵌入式实现
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-17 DOI: 10.1016/j.pmcj.2024.101975

Accelerating neural network (NN) controllers is important for improving the performance, efficiency, scalability, and reliability of real-time systems, particularly in resource-constrained embedded systems. This paper introduces a novel weight-dropout method for training neural network controllers in real-time closed-loop systems, aimed at accelerating the embedded implementation for solar inverters. The core idea is to eliminate small-magnitude weights during training, thereby reducing the number of necessary connections while ensuring the network’s convergence. To maintain convergence, only non-diagonal elements of the weight matrices were dropped. This dropout technique was integrated into the Levenberg–Marquardt and Forward Accumulation Through Time algorithms, resulting in more efficient training for trajectory tracking. We executed the proposed training algorithm with dropout on the AWS cloud, observing a performance increase of approximately four times compared to local execution. Furthermore, implementing the neural network controller on the Intel Cyclone V Field Programmable Gate Array (FPGA) demonstrates significant improvements in computational and resource efficiency due to the proposed dropout technique leading to sparse weight matrices. This optimization enhances the suitability of the neural network controller for embedded environments. In comparison to Sturtz et al. (2023), which dropped 11 weights, our approach eliminated 18 weights, significantly boosting resource efficiency. This resulted in a 16.40% reduction in Adaptive Logic Modules (ALMs), decreasing the count to 47,426.5. Combinational Look-Up Tables (LUTs) and dedicated logic registers saw reductions of 17.80% and 15.55%, respectively. However, the impact on block memory bits is minimal, showing only a 1% improvement, indicating that memory resources are less affected by weight dropout. In contrast, the usage of Memory 10 Kilobits (MK10s) dropped from 97 to 87, marking a 10% improvement. We also propose an adaptive dropout technique to further improve the previous results.

加速神经网络(NN)控制器对于提高实时系统的性能、效率、可扩展性和可靠性非常重要,尤其是在资源受限的嵌入式系统中。本文介绍了一种在实时闭环系统中训练神经网络控制器的新型权重去除方法,旨在加速太阳能逆变器的嵌入式实施。其核心思想是在训练过程中剔除幅度较小的权重,从而减少必要的连接数,同时确保网络的收敛性。为了保持收敛性,只剔除权重矩阵中的非对角元素。这种丢弃技术被集成到了 Levenberg-Marquardt 算法和时间前向累积算法中,从而提高了轨迹跟踪训练的效率。我们在 AWS 云上执行了建议的训练算法,与本地执行相比,性能提高了约四倍。此外,在英特尔 Cyclone V 现场可编程门阵列(FPGA)上实施神经网络控制器时,由于采用了建议的 "剔除 "技术,权重矩阵变得稀疏,因此计算和资源效率有了显著提高。这种优化提高了神经网络控制器在嵌入式环境中的适用性。与 Sturtz 等人(2023 年)放弃 11 个权重相比,我们的方法取消了 18 个权重,大大提高了资源效率。这使得自适应逻辑模块(ALM)减少了 16.40%,数量降至 47,426.5 个。组合查找表(LUT)和专用逻辑寄存器分别减少了 17.80% 和 15.55%。不过,对块存储器位的影响微乎其微,仅提高了 1%,这表明存储器资源受权重下降的影响较小。相比之下,内存 10 千比特(MK10)的使用率从 97 降至 87,提高了 10%。我们还提出了一种自适应丢弃技术,以进一步改进之前的结果。
{"title":"Accelerating the neural network controller embedded implementation on FPGA with novel dropout techniques for a solar inverter","authors":"","doi":"10.1016/j.pmcj.2024.101975","DOIUrl":"10.1016/j.pmcj.2024.101975","url":null,"abstract":"<div><p>Accelerating neural network (NN) controllers is important for improving the performance, efficiency, scalability, and reliability of real-time systems, particularly in resource-constrained embedded systems. This paper introduces a novel weight-dropout method for training neural network controllers in real-time closed-loop systems, aimed at accelerating the embedded implementation for solar inverters. The core idea is to eliminate small-magnitude weights during training, thereby reducing the number of necessary connections while ensuring the network’s convergence. To maintain convergence, only non-diagonal elements of the weight matrices were dropped. This dropout technique was integrated into the Levenberg–Marquardt and Forward Accumulation Through Time algorithms, resulting in more efficient training for trajectory tracking. We executed the proposed training algorithm with dropout on the AWS cloud, observing a performance increase of approximately four times compared to local execution. Furthermore, implementing the neural network controller on the Intel Cyclone V Field Programmable Gate Array (FPGA) demonstrates significant improvements in computational and resource efficiency due to the proposed dropout technique leading to sparse weight matrices. This optimization enhances the suitability of the neural network controller for embedded environments. In comparison to Sturtz et al. (2023), which dropped 11 weights, our approach eliminated 18 weights, significantly boosting resource efficiency. This resulted in a 16.40% reduction in Adaptive Logic Modules (ALMs), decreasing the count to 47,426.5. Combinational Look-Up Tables (LUTs) and dedicated logic registers saw reductions of 17.80% and 15.55%, respectively. However, the impact on block memory bits is minimal, showing only a 1% improvement, indicating that memory resources are less affected by weight dropout. In contrast, the usage of Memory 10 Kilobits (MK10s) dropped from 97 to 87, marking a 10% improvement. We also propose an adaptive dropout technique to further improve the previous results.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142040615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge human activity recognition using federated learning on constrained devices 在受限设备上利用联合学习进行边缘人类活动识别
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-08 DOI: 10.1016/j.pmcj.2024.101972

Human Activity Recognition (HAR) using wearable Internet of Things (IoT) devices represents a well investigated researched field encompassing various application domains. Many current approaches rely on cloud-based methodologies for gathering data from diverse users, resulting in the creation of extensive training datasets. Although this strategy facilitates the application of powerful Machine Learning (ML) techniques, it raises significant privacy concerns, which can become particularly severe given the sensitivity of HAR data. Moreover, the labeling process can be extremely time-consuming and even more challenging for IoT wearable devices due to the absence of efficient input systems. In this paper, we address both aforementioned challenges by designing, implementing, and validating edge-based Human Activity Recognition (HAR) systems that operate on resource-constrained IoT devices, which relies on the utilization of Self-Organizing Maps (SOM) for activity detection. We incorporate a feature selection process before training to reduce data dimensionality and, consequently, the SOM size, aligning with the resource limitations of wearable IoT devices. Additionally, we explore the application of Federated Learning (FL) techniques for HAR tasks, enabling new users to leverage SOM models trained by others on their respective datasets. Our federated Extreme Edge (EE)-aware HAR system is implemented on a wearable IoT device and rigorously tested against state-of-the-art and experimental datasets. The results demonstrate that our C++-based SOM implementation achieves a consistent reduction in model size compared to state-of-the-art approaches. Furthermore, our findings highlight the effectiveness of the FL-based approach in overcoming personalized training challenges, particularly in onboarding scenarios.

使用可穿戴物联网(IoT)设备进行人类活动识别(HAR)是一个经过深入研究的领域,涵盖各种应用领域。当前的许多方法都依赖于基于云的方法来收集来自不同用户的数据,从而创建大量的训练数据集。虽然这种策略有助于应用强大的机器学习(ML)技术,但它会引发严重的隐私问题,鉴于 HAR 数据的敏感性,这种问题会变得尤为严重。此外,由于缺乏高效的输入系统,标记过程可能会非常耗时,对于物联网可穿戴设备来说更具挑战性。在本文中,我们通过设计、实施和验证基于边缘的人类活动识别(HAR)系统来应对上述挑战,该系统可在资源受限的物联网设备上运行,依靠自组织图(SOM)进行活动检测。我们在训练前加入了一个特征选择过程,以降低数据维度,从而缩小自组织图的大小,这与可穿戴物联网设备的资源限制相一致。此外,我们还探索了联邦学习(FL)技术在 HAR 任务中的应用,使新用户能够利用其他人在各自数据集上训练的 SOM 模型。我们的联邦极端边缘(EE)感知 HAR 系统是在可穿戴物联网设备上实现的,并针对最先进的实验数据集进行了严格测试。结果表明,与最先进的方法相比,我们基于 C++ 的 SOM 实现了模型规模的持续缩小。此外,我们的研究结果还凸显了基于 FL 的方法在克服个性化培训挑战方面的有效性,尤其是在入职场景中。
{"title":"Edge human activity recognition using federated learning on constrained devices","authors":"","doi":"10.1016/j.pmcj.2024.101972","DOIUrl":"10.1016/j.pmcj.2024.101972","url":null,"abstract":"<div><p>Human Activity Recognition (HAR) using wearable Internet of Things (IoT) devices represents a well investigated researched field encompassing various application domains. Many current approaches rely on cloud-based methodologies for gathering data from diverse users, resulting in the creation of extensive training datasets. Although this strategy facilitates the application of powerful Machine Learning (ML) techniques, it raises significant privacy concerns, which can become particularly severe given the sensitivity of HAR data. Moreover, the labeling process can be extremely time-consuming and even more challenging for IoT wearable devices due to the absence of efficient input systems. In this paper, we address both aforementioned challenges by designing, implementing, and validating edge-based Human Activity Recognition (HAR) systems that operate on resource-constrained IoT devices, which relies on the utilization of Self-Organizing Maps (SOM) for activity detection. We incorporate a feature selection process before training to reduce data dimensionality and, consequently, the SOM size, aligning with the resource limitations of wearable IoT devices. Additionally, we explore the application of Federated Learning (FL) techniques for HAR tasks, enabling new users to leverage SOM models trained by others on their respective datasets. Our federated Extreme Edge (EE)-aware HAR system is implemented on a wearable IoT device and rigorously tested against state-of-the-art and experimental datasets. The results demonstrate that our C++-based SOM implementation achieves a consistent reduction in model size compared to state-of-the-art approaches. Furthermore, our findings highlight the effectiveness of the FL-based approach in overcoming personalized training challenges, particularly in onboarding scenarios.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":3.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S157411922400097X/pdfft?md5=00c8c39b201e7dc11581a2c5474e3422&pid=1-s2.0-S157411922400097X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142001976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Pervasive and Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1