首页 > 最新文献

Pervasive and Mobile Computing最新文献

英文 中文
Efficiently linking LoRaWAN identifiers through multi-domain fingerprinting 通过多域指纹识别高效链接LoRaWAN标识符
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-01 Epub Date: 2025-06-16 DOI: 10.1016/j.pmcj.2025.102082
Samuel Pélissier , Abhishek Kumar Mishra , Mathieu Cunche , Vincent Roca , Didier Donsez
LoRaWAN is a leading IoT technology worldwide, increasingly integrated into pervasive computing environments through a growing number of sensors in various industrial and consumer applications. Although its security vulnerabilities have been extensively explored in the recent literature, its ties to human activities warrant further privacy research. Existing device identification and activity inference attacks are only effective with a stable identifier. We find that the identifiers in LoRaWAN exhibit high variability, and more than half of the devices use them for less than a week. For the first time in the literature, we explore the feasibility of device fingerprinting in LoRaWAN, allowing long-term device linkage, i.e. associating various identifiers of the same device. We introduce a novel holistic fingerprint representation utilizing multiple domains, namely content, timing, and radio information, and present a machine learning-based solution for linking identifiers. Through a large-scale experimental evaluation based on real-world datasets containing up to 41 million messages, we study multiple scenarios, including an attacker with limited resources. We reach 0.98 linkage accuracy, underscoring the need for privacy-preserving measures. We showcase countermeasures including payload padding, random delays, and radio signal modulation, and conclude by assessing their impact on our fingerprinting solution.
LoRaWAN是全球领先的物联网技术,通过各种工业和消费应用中越来越多的传感器,越来越多地集成到普摄计算环境中。尽管它的安全漏洞在最近的文献中已经被广泛探讨,但它与人类活动的关系需要进一步的隐私研究。现有的设备识别和活动推断攻击只有在稳定的标识符下才有效。我们发现,LoRaWAN中的标识符表现出高度的可变性,超过一半的设备使用不到一周。在文献中,我们首次探索了LoRaWAN中设备指纹识别的可行性,允许长期设备联动,即将同一设备的各种标识符关联起来。我们引入了一种利用多域(即内容、时间和无线电信息)的全新整体指纹表示,并提出了一种基于机器学习的链接标识符解决方案。通过基于包含多达4100万条消息的真实世界数据集的大规模实验评估,我们研究了多种场景,包括资源有限的攻击者。我们达到了0.98的链接精度,强调了隐私保护措施的必要性。我们展示了包括有效载荷填充、随机延迟和无线电信号调制在内的对策,并通过评估它们对指纹识别解决方案的影响来得出结论。
{"title":"Efficiently linking LoRaWAN identifiers through multi-domain fingerprinting","authors":"Samuel Pélissier ,&nbsp;Abhishek Kumar Mishra ,&nbsp;Mathieu Cunche ,&nbsp;Vincent Roca ,&nbsp;Didier Donsez","doi":"10.1016/j.pmcj.2025.102082","DOIUrl":"10.1016/j.pmcj.2025.102082","url":null,"abstract":"<div><div>LoRaWAN is a leading IoT technology worldwide, increasingly integrated into pervasive computing environments through a growing number of sensors in various industrial and consumer applications. Although its security vulnerabilities have been extensively explored in the recent literature, its ties to human activities warrant further privacy research. Existing device identification and activity inference attacks are only effective with a stable identifier. We find that the identifiers in LoRaWAN exhibit high variability, and more than half of the devices use them for less than a week. For the first time in the literature, we explore the feasibility of device fingerprinting in LoRaWAN, allowing long-term device linkage, i.e. associating various identifiers of the same device. We introduce a novel holistic fingerprint representation utilizing multiple domains, namely content, timing, and radio information, and present a machine learning-based solution for linking identifiers. Through a large-scale experimental evaluation based on real-world datasets containing up to 41 million messages, we study multiple scenarios, including an attacker with limited resources. We reach 0.98 linkage accuracy, underscoring the need for privacy-preserving measures. We showcase countermeasures including payload padding, random delays, and radio signal modulation, and conclude by assessing their impact on our fingerprinting solution.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102082"},"PeriodicalIF":3.0,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144313756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight secure key establishment to create a secure channel between entities in a crowdsourcing environment 轻量级安全密钥建立,在众包环境中创建实体之间的安全通道
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-01 Epub Date: 2025-06-09 DOI: 10.1016/j.pmcj.2025.102078
Mahdi Nikooghadam, Hamid Reza Shahriari
The concept of crowdsourcing uses shared intelligence to solve complex tasks through group collaboration. Crowdsourcing involves gathering information and opinions from participants who submit their data, or solutions, over the Internet using a specific program. Given that the communication environment for crowdsourcing platforms is the Internet, there is a significant opportunity for attackers to compromise the confidentiality and integrity of information and violate participants’ privacy. Despite the great benefits of crowdsourcing, concerns about security and privacy are growing and require attention. Unfortunately based on our knowledge, the schemes presented to preserve security and privacy in crowdsourcing are susceptible to security and privacy attack and have a high computational and communication overhead. Therefore, they are not appropriate for crowdsourcing environments. This paper presents an ultra-lightweight authentication and key establishment protocol based on hash functions. This protocol meets all security requirements, is invulnerable to known attacks, and imposes a very low network overhead. The security of the proposed scheme has been formally proved, depicting the resistance of the proposed scheme to different types of possible attacks. In addition, the robustness of the proposed scheme against potential attacks has been proven through Scyther’s automatic software validation tool. The performance evaluation ultimately demonstrated that the proposed protocol incurs significantly reduced computational and communication costs compared to previous schemes and is very suitable for the crowdsourcing environment.
众包的概念是利用共享的智慧,通过团队协作来解决复杂的任务。众包包括从参与者那里收集信息和意见,这些参与者通过特定的程序在互联网上提交他们的数据或解决方案。鉴于众包平台的通信环境是互联网,攻击者有很大的机会破坏信息的保密性和完整性,侵犯参与者的隐私。尽管众包带来了巨大的好处,但对安全和隐私的担忧也在增加,需要引起人们的关注。不幸的是,根据我们的知识,在众包中提出的保护安全和隐私的方案容易受到安全和隐私攻击,并且具有很高的计算和通信开销。因此,它们不适合众包环境。提出了一种基于哈希函数的超轻量级认证和密钥建立协议。该协议满足所有安全需求,不受已知攻击的影响,并且网络开销非常低。提出的方案的安全性得到了正式证明,描述了提出的方案对不同类型可能的攻击的抵抗力。此外,所提出的方案对潜在攻击的鲁棒性已通过Scyther的自动软件验证工具得到验证。性能评估最终表明,与以前的方案相比,所提出的协议大大减少了计算和通信成本,非常适合众包环境。
{"title":"Lightweight secure key establishment to create a secure channel between entities in a crowdsourcing environment","authors":"Mahdi Nikooghadam,&nbsp;Hamid Reza Shahriari","doi":"10.1016/j.pmcj.2025.102078","DOIUrl":"10.1016/j.pmcj.2025.102078","url":null,"abstract":"<div><div>The concept of crowdsourcing uses shared intelligence to solve complex tasks through group collaboration. Crowdsourcing involves gathering information and opinions from participants who submit their data, or solutions, over the Internet using a specific program. Given that the communication environment for crowdsourcing platforms is the Internet, there is a significant opportunity for attackers to compromise the confidentiality and integrity of information and violate participants’ privacy. Despite the great benefits of crowdsourcing, concerns about security and privacy are growing and require attention. Unfortunately based on our knowledge, the schemes presented to preserve security and privacy in crowdsourcing are susceptible to security and privacy attack and have a high computational and communication overhead. Therefore, they are not appropriate for crowdsourcing environments. This paper presents an ultra-lightweight authentication and key establishment protocol based on hash functions. This protocol meets all security requirements, is invulnerable to known attacks, and imposes a very low network overhead. The security of the proposed scheme has been formally proved, depicting the resistance of the proposed scheme to different types of possible attacks. In addition, the robustness of the proposed scheme against potential attacks has been proven through Scyther’s automatic software validation tool. The performance evaluation ultimately demonstrated that the proposed protocol incurs significantly reduced computational and communication costs compared to previous schemes and is very suitable for the crowdsourcing environment.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102078"},"PeriodicalIF":3.0,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144262812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimized Multi Agent Reinforcement Learning solution for edge caching in the Internet of Vehicles 一种针对车联网边缘缓存的优化多智能体强化学习解决方案
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-01 Epub Date: 2025-06-13 DOI: 10.1016/j.pmcj.2025.102081
Mohamed Amine Ghamri, Badis Djamaa, Mohamed Akrem Benatia, Redouane Bellahmer
The Internet of Vehicles has evolved significantly with the integration of intelligent technologies, transforming vehicular networks by enhancing communication, resource management, and decision-making at the network’s edge. With the increasing complexity of vehicular environments and data demands, efficient caching mechanisms have become essential to ensure seamless service delivery and optimized resource usage. In this paper, we present LF-MARLEC, a Leader Follower Multi-Agent Reinforcement Learning solution for Edge Caching within the Internet of Vehicles. Our approach introduces a hierarchical distribution of action importance, enabling more effective decision-making at the network edge. Extensive experiments, conducted using widely adopted simulation tools such as SUMO and Veins, demonstrate that our approach substantially enhances caching performance and overall system efficiency. Specifically, our approach achieves nearly 9% reduction in content distribution delay and over 11% improvement in cache hit rate compared to state-of-the-art methods, thereby enhancing the effectiveness of intelligent edge caching in Internet of Vehicles environments. The source code is publicly available at: https://github.com/amine9008/RL-EDGE-CACHING.
随着智能技术的融合,车联网已经发生了重大变化,通过增强网络边缘的通信、资源管理和决策,改变了汽车网络。随着车辆环境和数据需求的日益复杂,高效的缓存机制已成为确保无缝服务交付和优化资源使用的必要条件。在本文中,我们提出了LF-MARLEC,一种用于车辆互联网边缘缓存的领导跟随多智能体强化学习解决方案。我们的方法引入了行动重要性的分层分布,从而在网络边缘实现更有效的决策。使用广泛采用的仿真工具(如SUMO和vein)进行的大量实验表明,我们的方法大大提高了缓存性能和整体系统效率。具体来说,与最先进的方法相比,我们的方法使内容分发延迟减少了近9%,缓存命中率提高了11%以上,从而提高了智能边缘缓存在车联网环境中的有效性。源代码可以在:https://github.com/amine9008/RL-EDGE-CACHING上公开获得。
{"title":"An optimized Multi Agent Reinforcement Learning solution for edge caching in the Internet of Vehicles","authors":"Mohamed Amine Ghamri,&nbsp;Badis Djamaa,&nbsp;Mohamed Akrem Benatia,&nbsp;Redouane Bellahmer","doi":"10.1016/j.pmcj.2025.102081","DOIUrl":"10.1016/j.pmcj.2025.102081","url":null,"abstract":"<div><div>The Internet of Vehicles has evolved significantly with the integration of intelligent technologies, transforming vehicular networks by enhancing communication, resource management, and decision-making at the network’s edge. With the increasing complexity of vehicular environments and data demands, efficient caching mechanisms have become essential to ensure seamless service delivery and optimized resource usage. In this paper, we present LF-MARLEC, a Leader Follower Multi-Agent Reinforcement Learning solution for Edge Caching within the Internet of Vehicles. Our approach introduces a hierarchical distribution of action importance, enabling more effective decision-making at the network edge. Extensive experiments, conducted using widely adopted simulation tools such as SUMO and Veins, demonstrate that our approach substantially enhances caching performance and overall system efficiency. Specifically, our approach achieves nearly 9% reduction in content distribution delay and over 11% improvement in cache hit rate compared to state-of-the-art methods, thereby enhancing the effectiveness of intelligent edge caching in Internet of Vehicles environments. The source code is publicly available at: <span><span>https://github.com/amine9008/RL-EDGE-CACHING</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102081"},"PeriodicalIF":3.0,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144364550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A-BEE-C: Autonomous Bandwidth-Efficient Edge Codecast A-BEE-C:自主带宽高效边缘编解码器
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-01 Epub Date: 2025-06-04 DOI: 10.1016/j.pmcj.2025.102075
Gyujeong Lim , Joon-Min Gil , Heonchang Yu
Edge computing is a new paradigm in cloud infrastructure that decentralizes computing and storage, bringing data and services closer to the users. This proximity allows users to access high quality or large sized data with lower latency. However, edge servers typically have fewer resources than cloud servers, necessitating efficient resource management. Emerging research focuses on increasing the cache hit rate of user requests to edge servers, which reduces response latency and improves efficiency. Nonetheless, if available bandwidth is not considered, it becomes challenging to maintain both speed and quality in edge environments. This paper proposes an Autonomous Bandwidth-Efficient Edge Codecast (A-BEE-C) method to enhance the effective bandwidth per device within an edge service area. Codecast, introduced in this paper, is a transmission method that encodes multiple files into a single file before sending it to users. A-BEE-C introduces a dynamic mechanism that switches between unicast and codecast modes based on real-time bandwidth assessment. Our proposed method increases the effective bandwidth per device by encoding multiple user requests into a single coded transmission when the bandwidth of the edge server is limited. Experimental results demonstrate that A-BEE-C reduces average latency per device by up to 9.89% (and up to 18.45% with Zipf pattern data) and increases effective bandwidth per user by up to 10.15% (up to 18.11% with Zipf pattern).
边缘计算是云基础设施中的一种新模式,它分散了计算和存储,使数据和服务更接近用户。这种接近性允许用户以更低的延迟访问高质量或大容量的数据。但是,边缘服务器通常比云服务器拥有更少的资源,因此需要有效的资源管理。新兴研究的重点是提高用户请求到边缘服务器的缓存命中率,从而减少响应延迟并提高效率。尽管如此,如果不考虑可用带宽,那么在边缘环境中保持速度和质量就变得具有挑战性。本文提出了一种自主带宽高效边缘编播(A-BEE-C)方法,以提高边缘服务区内每个设备的有效带宽。本文介绍的编解码是一种将多个文件编码成一个文件再发送给用户的传输方法。a - bee - c引入了一种基于实时带宽评估在单播和编播模式之间切换的动态机制。该方法在边缘服务器带宽有限的情况下,通过将多个用户请求编码为单个编码传输,提高了每个设备的有效带宽。实验结果表明,A-BEE-C将每个设备的平均延迟减少了9.89% (Zipf模式数据最多减少18.45%),并将每个用户的有效带宽增加了10.15% (Zipf模式数据最多减少18.11%)。
{"title":"A-BEE-C: Autonomous Bandwidth-Efficient Edge Codecast","authors":"Gyujeong Lim ,&nbsp;Joon-Min Gil ,&nbsp;Heonchang Yu","doi":"10.1016/j.pmcj.2025.102075","DOIUrl":"10.1016/j.pmcj.2025.102075","url":null,"abstract":"<div><div>Edge computing is a new paradigm in cloud infrastructure that decentralizes computing and storage, bringing data and services closer to the users. This proximity allows users to access high quality or large sized data with lower latency. However, edge servers typically have fewer resources than cloud servers, necessitating efficient resource management. Emerging research focuses on increasing the cache hit rate of user requests to edge servers, which reduces response latency and improves efficiency. Nonetheless, if available bandwidth is not considered, it becomes challenging to maintain both speed and quality in edge environments. This paper proposes an Autonomous Bandwidth-Efficient Edge Codecast (A-BEE-C) method to enhance the effective bandwidth per device within an edge service area. Codecast, introduced in this paper, is a transmission method that encodes multiple files into a single file before sending it to users. A-BEE-C introduces a dynamic mechanism that switches between unicast and codecast modes based on real-time bandwidth assessment. Our proposed method increases the effective bandwidth per device by encoding multiple user requests into a single coded transmission when the bandwidth of the edge server is limited. Experimental results demonstrate that A-BEE-C reduces average latency per device by up to 9.89% (and up to 18.45% with Zipf pattern data) and increases effective bandwidth per user by up to 10.15% (up to 18.11% with Zipf pattern).</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102075"},"PeriodicalIF":3.0,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144221106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced hybrid prototype for few-shot class-incremental gait recognition in multi-activity scenarios using wearable sensors 基于可穿戴传感器的多活动场景下多镜头类增量步态识别的增强混合原型
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-01 Epub Date: 2025-07-16 DOI: 10.1016/j.pmcj.2025.102092
Chao Lin, Zhanyong Mei, Linlong Mao, Zijie Mei
Wearable devices for gait information sensing provide a reliable and robust solution for identity recognition. However, in real-world applications, gait recognition systems based on these sensing devices should adapt to diverse walking activities, tackle the challenge of limited individual data, and continuously update to recognize both old and new users. In this study, we propose a framework based on hybrid prototype enhancement to address the challenge of few-shot class-incremental gait recognition in multi-activity scenarios (FC-GRMA). Firstly, hybrid prototypes are generated by introducing auxiliary activity labels, which are more generalizable than ordinary prototypes; secondly, the prototypes are adjusted by a selective prototype enhancement module, which improves the representative and discriminative abilities of the prototypes. Finally, validation on the public dataset USC-HAD and the self-built dataset CDUT-AG shows that our proposed framework performs best in solving the FC-GRMA problem. In particular, we also discuss the effect of different numbers of activities on the model performance, and the results show that our framework effectively addresses the issue of catastrophic forgetting in multi-activity scenarios. The source code is available at https://github.com/lc321/fc-grma.git.
步态信息传感可穿戴设备为身份识别提供了可靠、鲁棒的解决方案。然而,在现实应用中,基于这些传感设备的步态识别系统应该适应不同的步行活动,解决个人数据有限的挑战,并不断更新以识别新老用户。在这项研究中,我们提出了一个基于混合原型增强的框架来解决多活动场景下的少镜头类增量步态识别(FC-GRMA)的挑战。首先,通过引入辅助活动标签生成混合原型,使其具有比普通原型更强的泛化性;其次,通过选择性原型增强模块对原型进行调整,提高了原型的代表性和判别能力;最后,在公共数据集USC-HAD和自建数据集ctut - ag上的验证表明,我们提出的框架在解决FC-GRMA问题上表现最好。特别地,我们还讨论了不同活动数量对模型性能的影响,结果表明我们的框架有效地解决了多活动场景下的灾难性遗忘问题。源代码可从https://github.com/lc321/fc-grma.git获得。
{"title":"Enhanced hybrid prototype for few-shot class-incremental gait recognition in multi-activity scenarios using wearable sensors","authors":"Chao Lin,&nbsp;Zhanyong Mei,&nbsp;Linlong Mao,&nbsp;Zijie Mei","doi":"10.1016/j.pmcj.2025.102092","DOIUrl":"10.1016/j.pmcj.2025.102092","url":null,"abstract":"<div><div>Wearable devices for gait information sensing provide a reliable and robust solution for identity recognition. However, in real-world applications, gait recognition systems based on these sensing devices should adapt to diverse walking activities, tackle the challenge of limited individual data, and continuously update to recognize both old and new users. In this study, we propose a framework based on hybrid prototype enhancement to address the challenge of few-shot class-incremental gait recognition in multi-activity scenarios (<em>FC-GRMA</em>). Firstly, hybrid prototypes are generated by introducing auxiliary activity labels, which are more generalizable than ordinary prototypes; secondly, the prototypes are adjusted by a selective prototype enhancement module, which improves the representative and discriminative abilities of the prototypes. Finally, validation on the public dataset USC-HAD and the self-built dataset CDUT-AG shows that our proposed framework performs best in solving the <em>FC-GRMA</em> problem. In particular, we also discuss the effect of different numbers of activities on the model performance, and the results show that our framework effectively addresses the issue of catastrophic forgetting in multi-activity scenarios. The source code is available at <span><span>https://github.com/lc321/fc-grma.git</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102092"},"PeriodicalIF":3.0,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144680694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task offloading of IOT device in fog-enabled architecture using deep reinforcement learning approach 使用深度强化学习方法在雾支持架构中卸载物联网设备的任务
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-01 Epub Date: 2025-05-31 DOI: 10.1016/j.pmcj.2025.102067
Abhinav Tomar, Megha Sharma, Ashwarya Agarwal, Aditya Nath Jha, Jai Jaiswal
The rapid growth of IoT devices has strained traditional cloud-centric architectures, revealing limitations in latency, bandwidth, and reliability. Fog computing addresses these issues by decentralizing resources closer to data sources, but task offloading and resource allocation remain challenging due to dynamic workloads, heterogeneous resources, and strict QoS requirements. This study models task offloading as a multi-objective optimization problem, considering task priority, energy efficiency, latency, and deadlines. Using a Markov Decision Process (MDP), it applies three Deep Reinforcement Learning (DRL) algorithms — DQN, DDPG, and SAC — in a multi-agent fog computing setup. Unlike prior work focused on single-agent or isolated metrics, this approach captures inter-node dependencies to improve overall resource use. Simulations show SAC achieves a 97.3% task deadline success rate and improves resource efficiency by 10.1%, highlighting its effectiveness in managing dynamic fog environments. These results advance scalable, adaptive offloading strategies for future IoT systems.
物联网设备的快速增长给传统的以云为中心的架构带来了压力,暴露出延迟、带宽和可靠性方面的局限性。雾计算通过分散离数据源更近的资源来解决这些问题,但是由于动态工作负载、异构资源和严格的QoS要求,任务卸载和资源分配仍然具有挑战性。本研究将任务卸载建模为一个多目标优化问题,考虑了任务优先级、能效、延迟和截止日期。使用马尔可夫决策过程(MDP),它在多代理雾计算设置中应用了三种深度强化学习(DRL)算法- DQN, DDPG和SAC。与之前关注单个代理或孤立度量的工作不同,该方法捕获节点间依赖关系,以提高整体资源使用。仿真结果表明,SAC算法的任务期限成功率为97.3%,资源效率提高了10.1%,在管理动态雾环境方面具有较好的效果。这些结果为未来的物联网系统提供了可扩展的、自适应的卸载策略。
{"title":"Task offloading of IOT device in fog-enabled architecture using deep reinforcement learning approach","authors":"Abhinav Tomar,&nbsp;Megha Sharma,&nbsp;Ashwarya Agarwal,&nbsp;Aditya Nath Jha,&nbsp;Jai Jaiswal","doi":"10.1016/j.pmcj.2025.102067","DOIUrl":"10.1016/j.pmcj.2025.102067","url":null,"abstract":"<div><div>The rapid growth of IoT devices has strained traditional cloud-centric architectures, revealing limitations in latency, bandwidth, and reliability. Fog computing addresses these issues by decentralizing resources closer to data sources, but task offloading and resource allocation remain challenging due to dynamic workloads, heterogeneous resources, and strict QoS requirements. This study models task offloading as a multi-objective optimization problem, considering task priority, energy efficiency, latency, and deadlines. Using a Markov Decision Process (MDP), it applies three Deep Reinforcement Learning (DRL) algorithms — DQN, DDPG, and SAC — in a multi-agent fog computing setup. Unlike prior work focused on single-agent or isolated metrics, this approach captures inter-node dependencies to improve overall resource use. Simulations show SAC achieves a 97.3% task deadline success rate and improves resource efficiency by 10.1%, highlighting its effectiveness in managing dynamic fog environments. These results advance scalable, adaptive offloading strategies for future IoT systems.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102067"},"PeriodicalIF":3.0,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144194944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A customizable benchmarking tool for evaluating personalized thermal comfort provisioning in smart spaces using Digital Twins 一个可定制的基准工具,用于使用Digital Twins评估智能空间的个性化热舒适配置
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-01 Epub Date: 2025-06-04 DOI: 10.1016/j.pmcj.2025.102076
Jun Ma , Dimitrije Panic , Roberto Yus , Georgios Bouloukakis
Providing proper thermal comfort to individual occupants is crucial to improve well-being and work efficiency. However, Heating, Ventilation, and Air Conditioning (HVAC) systems are responsible for a large portion of energy consumption and CO2 emissions in buildings. To combat the current energy crisis and climate change, innovative ways have been proposed to leverage pervasive and mobile computing systems equipped with sensors and smart devices for occupant thermal comfort satisfaction and efficient HVAC management. However, evaluating these thermal comfort provision solutions presents considerable difficulties. Conducting experiments in the real world poses challenges such as privacy concerns and the high costs of installing and maintaining sensor infrastructure. On the other hand, experiments with simulations need to accurately model real-world conditions and ensure the reliability of the simulated data.
To address these challenges, we present Co-zyBench, an innovative benchmarking tool that leverages Digital Twin (DT) technology to assess personalized thermal comfort provision systems. Our benchmark employs a simulation-based DT for the building and its HVAC system, another DT for simulating the dynamic behavior of its occupants, and a co-simulation middleware to achieve a seamless connection of the DTs. Our benchmark includes mechanisms to generate DTs based on data such as architectural models of buildings, sensor readings, and occupant thermal sensation data. It also includes reference DTs based on standard buildings, HVAC configurations, and various occupant thermal profiles. As a result of the evaluation, the benchmark generates a report based on expected energy consumption, carbon emission, thermal comfort, and occupant equity metrics. We present the evaluation results of state-of-the-art thermal comfort provisioning systems within a DT based on a real building and several reference DTs.
为个体居住者提供适当的热舒适对于提高幸福感和工作效率至关重要。然而,供暖、通风和空调(HVAC)系统占建筑物能源消耗和二氧化碳排放的很大一部分。为了应对当前的能源危机和气候变化,人们提出了创新的方法,利用配备传感器和智能设备的普适和移动计算系统来满足居住者的热舒适和高效的暖通空调管理。然而,评估这些热舒适提供解决方案存在相当大的困难。在现实世界中进行实验会带来一些挑战,比如隐私问题,以及安装和维护传感器基础设施的高成本。另一方面,模拟实验需要准确地模拟真实情况,保证模拟数据的可靠性。为了应对这些挑战,我们提出了Co-zyBench,这是一种利用数字孪生(DT)技术评估个性化热舒适供应系统的创新基准工具。我们的基准测试采用了一个基于模拟的DT来模拟建筑及其HVAC系统,另一个用于模拟居住者动态行为的DT,以及一个联合仿真中间件来实现DT的无缝连接。我们的基准包括基于建筑物的建筑模型、传感器读数和居住者热感觉数据等数据生成dt的机制。它还包括基于标准建筑、暖通空调配置和各种乘员热概况的参考dt。作为评估的结果,基准会根据预期的能源消耗、碳排放、热舒适和居住者公平指标生成报告。我们介绍了基于真实建筑和几个参考DT的DT内最先进的热舒适供应系统的评估结果。
{"title":"A customizable benchmarking tool for evaluating personalized thermal comfort provisioning in smart spaces using Digital Twins","authors":"Jun Ma ,&nbsp;Dimitrije Panic ,&nbsp;Roberto Yus ,&nbsp;Georgios Bouloukakis","doi":"10.1016/j.pmcj.2025.102076","DOIUrl":"10.1016/j.pmcj.2025.102076","url":null,"abstract":"<div><div>Providing proper thermal comfort to individual occupants is crucial to improve well-being and work efficiency. However, Heating, Ventilation, and Air Conditioning (HVAC) systems are responsible for a large portion of energy consumption and CO2 emissions in buildings. To combat the current energy crisis and climate change, innovative ways have been proposed to leverage pervasive and mobile computing systems equipped with sensors and smart devices for occupant thermal comfort satisfaction and efficient HVAC management. However, evaluating these thermal comfort provision solutions presents considerable difficulties. Conducting experiments in the real world poses challenges such as privacy concerns and the high costs of installing and maintaining sensor infrastructure. On the other hand, experiments with simulations need to accurately model real-world conditions and ensure the reliability of the simulated data.</div><div>To address these challenges, we present Co-zyBench, an innovative benchmarking tool that leverages Digital Twin (DT) technology to assess personalized thermal comfort provision systems. Our benchmark employs a simulation-based DT for the building and its HVAC system, another DT for simulating the dynamic behavior of its occupants, and a co-simulation middleware to achieve a seamless connection of the DTs. Our benchmark includes mechanisms to generate DTs based on data such as architectural models of buildings, sensor readings, and occupant thermal sensation data. It also includes reference DTs based on standard buildings, HVAC configurations, and various occupant thermal profiles. As a result of the evaluation, the benchmark generates a report based on expected energy consumption, carbon emission, thermal comfort, and occupant equity metrics. We present the evaluation results of state-of-the-art thermal comfort provisioning systems within a DT based on a real building and several reference DTs.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102076"},"PeriodicalIF":3.0,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144241928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An energy-efficient IoMT three-tier architecture for continuous monitoring of endangered bird species 一种节能的IoMT三层结构,用于濒危鸟类物种的持续监测
IF 3.5 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-01 Epub Date: 2025-07-24 DOI: 10.1016/j.pmcj.2025.102093
Aya Sakhri , Moufida Maimour , Noureddine Doghmane , Eric Rondeau , Saliha Harize
The alarming decline in animal populations, particularly birds, due to environmental degradation necessitates close monitoring of endangered migratory waterbirds in their natural habitats. This can be accomplished through the continuous capture and transmission for population estimation, habitat analysis, and various relevant studies. This paper introduces a three-tier IoMT (Internet of Multimedia Things) deployed along the Edge-Cloud continuum for automated bird monitoring systems aimed at safeguarding endangered waterbird populations. At the edge level, Wireless Multimedia Sensor Networks (WMSN) are used to periodically capture and transmit images to a central collection station (fog level). Challenges such as limited bandwidth and power in Low-Power and Lossy Networks (LLNs) are addressed through local audio identification of endangered bird calls, which activates cameras only for target birds. This significantly reduces data transmission and conserves energy. To tackle ambient noise issues in audio recognition, especially in complex environments such as wetlands, an appropriate noise reduction technique is employed to augment our automatic bird call recognition system. This paper details an energy-efficient approach addressing LLNs’ challenges and incorporates robust noise reduction techniques to improve local audio recognition. The research includes a thorough analysis of potential technical solutions prior to implementation, establishing a critical phase in the system development.
由于环境退化,动物种群,特别是鸟类的数量急剧下降,因此有必要密切监测濒危迁徙水鸟在其自然栖息地的情况。这可以通过持续捕获和传输来实现,用于种群估计、栖息地分析和各种相关研究。本文介绍了一种沿边缘云连续体部署的三层多媒体物联网(IoMT),用于鸟类自动监测系统,旨在保护濒危水鸟种群。在边缘级,无线多媒体传感器网络(WMSN)用于周期性地捕获图像并将其传输到中央采集站(雾级)。在低功耗和有损网络(lln)中,带宽和功率有限的挑战是通过本地音频识别濒危鸟类的叫声来解决的,这只会激活目标鸟类的摄像机。这大大减少了数据传输,节约了能源。为了解决音频识别中的环境噪声问题,特别是在湿地等复杂环境中,我们采用了一种适当的降噪技术来增强我们的自动鸟叫声识别系统。本文详细介绍了解决lln挑战的节能方法,并结合了强大的降噪技术来提高本地音频识别。该研究包括在实施之前对潜在的技术解决方案进行彻底的分析,建立系统开发的关键阶段。
{"title":"An energy-efficient IoMT three-tier architecture for continuous monitoring of endangered bird species","authors":"Aya Sakhri ,&nbsp;Moufida Maimour ,&nbsp;Noureddine Doghmane ,&nbsp;Eric Rondeau ,&nbsp;Saliha Harize","doi":"10.1016/j.pmcj.2025.102093","DOIUrl":"10.1016/j.pmcj.2025.102093","url":null,"abstract":"<div><div>The alarming decline in animal populations, particularly birds, due to environmental degradation necessitates close monitoring of endangered migratory waterbirds in their natural habitats. This can be accomplished through the continuous capture and transmission for population estimation, habitat analysis, and various relevant studies. This paper introduces a three-tier IoMT (Internet of Multimedia Things) deployed along the Edge-Cloud continuum for automated bird monitoring systems aimed at safeguarding endangered waterbird populations. At the edge level, Wireless Multimedia Sensor Networks (WMSN) are used to periodically capture and transmit images to a central collection station (fog level). Challenges such as limited bandwidth and power in Low-Power and Lossy Networks (LLNs) are addressed through local audio identification of endangered bird calls, which activates cameras only for target birds. This significantly reduces data transmission and conserves energy. To tackle ambient noise issues in audio recognition, especially in complex environments such as wetlands, an appropriate noise reduction technique is employed to augment our automatic bird call recognition system. This paper details an energy-efficient approach addressing LLNs’ challenges and incorporates robust noise reduction techniques to improve local audio recognition. The research includes a thorough analysis of potential technical solutions prior to implementation, establishing a critical phase in the system development.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102093"},"PeriodicalIF":3.5,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144724153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital twin-enabled age of information-aware scheduling for Industrial IoT edge networks 工业物联网边缘网络的信息感知调度数字孪生时代
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-01 Epub Date: 2025-06-16 DOI: 10.1016/j.pmcj.2025.102083
Elif Bozkaya-Aras
Mobile Edge Computing (MEC) is a significant technology employed in the development of the Industrial Internet of Things (IIoT) as it allows the collection and processing of high volumes of data at the network edge to support industrial processes and improve operational efficiency and productivity. However, despite significant advances in MEC capabilities, the stringent latency requirement that may occur in computation-intensive tasks may affect the freshness of status information. Therefore, there are practical challenges in scheduling the tasks associated with computational efficiency in local computation and remote computation. In this context, we propose an Age of Information (AoI)-based scheduler to determine where to execute computational tasks in order to continuously track state data updates, where the AoI metric measures the time elapsed from the generation of the computation task at the source to the latest received update at the destination. The contributions of this paper are threefold: First, we propose a digital twin-enabled AoI-based scheduler model that collects real-time data from IIoT nodes and predicts the best task assignment in terms of local computation and remote computation. The digital twin environment allows monitoring of the state changes of the real physical assets over time and optimizes the scheduling strategy. Second, we formulate the average AoI problem with the M/M/1 queueing model and propose a genetic algorithm-based scheduler to minimize AoI and task completion time to efficiently schedule the computation tasks between IIoT devices and MEC servers. Third, we compare the performance of our digital twin-enabled model with the traditional strategies and make a significant contribution to IIoT edge network management by analyzing AoI, task completion time and MEC server utilization.
移动边缘计算(MEC)是工业物联网(IIoT)发展中采用的一项重要技术,因为它允许在网络边缘收集和处理大量数据,以支持工业流程并提高运营效率和生产力。然而,尽管MEC功能取得了重大进展,但在计算密集型任务中可能出现的严格延迟需求可能会影响状态信息的新鲜度。因此,在本地计算和远程计算中,与计算效率相关的任务调度存在着实际的挑战。在这种情况下,我们提出了一个基于信息时代(AoI)的调度器,以确定在何处执行计算任务,以便连续跟踪状态数据更新,其中AoI度量度量从源处的计算任务生成到目标处最新接收到的更新所经过的时间。本文的贡献有三个方面:首先,我们提出了一个基于数字双机的基于aoi的调度器模型,该模型从IIoT节点收集实时数据,并根据本地计算和远程计算预测最佳任务分配。数字孪生环境允许监控实际物理资产随时间的状态变化,并优化调度策略。其次,我们用M/M/1队列模型构造了平均AoI问题,并提出了一种基于遗传算法的调度程序来最小化AoI和任务完成时间,从而有效地调度IIoT设备和MEC服务器之间的计算任务。第三,我们比较了我们的数字孪生模型与传统策略的性能,并通过分析AoI,任务完成时间和MEC服务器利用率,为工业物联网边缘网络管理做出了重大贡献。
{"title":"Digital twin-enabled age of information-aware scheduling for Industrial IoT edge networks","authors":"Elif Bozkaya-Aras","doi":"10.1016/j.pmcj.2025.102083","DOIUrl":"10.1016/j.pmcj.2025.102083","url":null,"abstract":"<div><div>Mobile Edge Computing (MEC) is a significant technology employed in the development of the Industrial Internet of Things (IIoT) as it allows the collection and processing of high volumes of data at the network edge to support industrial processes and improve operational efficiency and productivity. However, despite significant advances in MEC capabilities, the stringent latency requirement that may occur in computation-intensive tasks may affect the freshness of status information. Therefore, there are practical challenges in scheduling the tasks associated with computational efficiency in local computation and remote computation. In this context, we propose an Age of Information (AoI)-based scheduler to determine where to execute computational tasks in order to continuously track state data updates, where the AoI metric measures the time elapsed from the generation of the computation task at the source to the latest received update at the destination. The contributions of this paper are threefold: First, we propose a digital twin-enabled AoI-based scheduler model that collects real-time data from IIoT nodes and predicts the best task assignment in terms of local computation and remote computation. The digital twin environment allows monitoring of the state changes of the real physical assets over time and optimizes the scheduling strategy. Second, we formulate the average AoI problem with the M/M/1 queueing model and propose a genetic algorithm-based scheduler to minimize AoI and task completion time to efficiently schedule the computation tasks between IIoT devices and MEC servers. Third, we compare the performance of our digital twin-enabled model with the traditional strategies and make a significant contribution to IIoT edge network management by analyzing AoI, task completion time and MEC server utilization.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"112 ","pages":"Article 102083"},"PeriodicalIF":3.0,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144313757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Octopus: Knapsack model-driven federated learning client selection in internet of vehicles Octopus:车联网中背包模型驱动的联合学习客户端选择
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 Epub Date: 2025-05-16 DOI: 10.1016/j.pmcj.2025.102063
Ling Xing , Jingjing Cui , Jianping Gao , Kaikai Deng , Honghai Wu , Huahong Ma
Federated learning (FL), as a distributed way for processing real-time vehicle data, is widely used to improve driving experience and enhance service quality in Internet of Vehicles (IoV). However, considering the data and devices heterogeneity of vehicle nodes, randomly selecting vehicles that are involved in model training would suffer from data skewness, high resource consumption, and low convergence speed. To this end, we propose Octopus, which consists of two components: i) an importance sampling-based local loss computation method is designed to request resource information for each client and apply the importance sampling technique to assess each client’s contribution to the global model’s convergence, followed by utilizing a knapsack model that treats the local loss of each client as the item value, while treating the total system training time as the knapsack capacity to accelerate the client convergence; ii) a knapsack model-based federated learning client selection method is designed to select the client with optimal local loss and maximum model uploading speed to participate in training. In each training round, these clients download and update the model within a predefined time, followed by enabling the selected clients to continue uploading the updated model parameters for assisting the server to efficiently complete the model aggregation. Experimental results show that Octopus improved the model accuracy by 2.64% 32.61% with heterogeneous data, and by 1.97% 11.74% with device heterogeneity, compared to eight state-of-the-art baselines.
联邦学习(FL)作为一种分布式的实时车辆数据处理方式,在车联网(IoV)中被广泛用于改善驾驶体验和提高服务质量。但考虑到车辆节点数据和设备的异构性,随机选择参与模型训练的车辆存在数据偏倚、资源消耗大、收敛速度低等问题。为此,我们提出了Octopus,它由两个部分组成:1)设计了一种基于重要性抽样的局部损失计算方法,为每个客户端请求资源信息,并应用重要性抽样技术评估每个客户端对全局模型收敛的贡献,然后利用以每个客户端的局部损失作为项目值,以系统总训练时间作为背包容量的背包模型加速客户端收敛;Ii)设计基于背包模型的联邦学习客户端选择方法,选择局部损失最优、模型上传速度最大的客户端参与训练。在每一轮训练中,这些客户端在预定义的时间内下载和更新模型,然后使所选的客户端能够继续上传更新的模型参数,以帮助服务器有效地完成模型聚合。实验结果表明,与8个最先进的基线相比,Octopus在异构数据下将模型精度提高了2.64% ~ 32.61%,在设备异构数据下将模型精度提高了1.97% ~ 11.74%。
{"title":"Octopus: Knapsack model-driven federated learning client selection in internet of vehicles","authors":"Ling Xing ,&nbsp;Jingjing Cui ,&nbsp;Jianping Gao ,&nbsp;Kaikai Deng ,&nbsp;Honghai Wu ,&nbsp;Huahong Ma","doi":"10.1016/j.pmcj.2025.102063","DOIUrl":"10.1016/j.pmcj.2025.102063","url":null,"abstract":"<div><div>Federated learning (FL), as a distributed way for processing real-time vehicle data, is widely used to improve driving experience and enhance service quality in Internet of Vehicles (IoV). However, considering the data and devices heterogeneity of vehicle nodes, randomly selecting vehicles that are involved in model training would suffer from data skewness, high resource consumption, and low convergence speed. To this end, we propose <span>Octopus</span>, which consists of two components: i) an <em>importance sampling-based local loss computation</em> method is designed to request resource information for each client and apply the importance sampling technique to assess each client’s contribution to the global model’s convergence, followed by utilizing a knapsack model that treats the local loss of each client as the item value, while treating the total system training time as the knapsack capacity to accelerate the client convergence; ii) a <em>knapsack model-based federated learning client selection</em> method is designed to select the client with optimal local loss and maximum model uploading speed to participate in training. In each training round, these clients download and update the model within a predefined time, followed by enabling the selected clients to continue uploading the updated model parameters for assisting the server to efficiently complete the model aggregation. Experimental results show that <span>Octopus</span> improved the model accuracy by 2.64% <span><math><mo>∼</mo></math></span>32.61% with heterogeneous data, and by 1.97% <span><math><mo>∼</mo></math></span>11.74% with device heterogeneity, compared to eight state-of-the-art baselines.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"111 ","pages":"Article 102063"},"PeriodicalIF":3.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144071054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Pervasive and Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1