首页 > 最新文献

Pervasive and Mobile Computing最新文献

英文 中文
Differentiating presence in virtual reality using physiological signals 利用生理信号区分虚拟现实中的存在感
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 Epub Date: 2025-05-23 DOI: 10.1016/j.pmcj.2025.102065
Shuvodeep Saha , Chelsea Dobbins , Anubha Gupta , Arindam Dey
Advancements in wearable technologies have made the use of physiological signals, such as Electrodermal Activity (EDA) and Heart Rate Variability (HRV), more prevalent for detecting changes in the autonomic nervous system within virtual reality (VR). However, the challenge lies in utilizing these signals to objectively detect presence in VR, which typically relies on self-reports that can be inherently biased. This paper addresses this issue and presents a study (N=26) that investigates the effect that different levels of presence has on physiological responses in VR. A neutral VR environment was created that incorporated three levels of presence (high, medium and low) that were invoked by tuning different parameters. Participants wore a wrist-worn wearable device that captured their physiological signals whilst they experienced each of these environments. Results indicated that tonic and phasic components of the EDA signal were significant in differentiating between the levels. Two novel features, constructed using both the phasic and tonic components of EDA, successfully differentiated between presence levels. Analysis of the HRV data illustrated a significant difference between the low and medium levels using the ratio between low frequency to high frequency.
可穿戴技术的进步使得使用生理信号,如皮电活动(EDA)和心率变异性(HRV),在虚拟现实(VR)中更普遍地用于检测自主神经系统的变化。然而,挑战在于利用这些信号来客观地检测VR中的存在,这通常依赖于可能存在固有偏见的自我报告。本文解决了这一问题,并提出了一项研究(N=26),该研究调查了不同程度的存在对VR生理反应的影响。我们创造了一个中性的VR环境,其中包含了通过调整不同参数调用的三个存在级别(高、中、低)。参与者戴着一个手腕上的可穿戴设备,当他们经历这些环境时,该设备会捕捉他们的生理信号。结果表明,EDA信号的强直和相位成分在不同水平间具有显著的差异。使用EDA的相位和张力成分构建的两个新特征成功地区分了存在水平。对HRV数据的分析表明,使用低频与高频之间的比率,低、中水平之间存在显著差异。
{"title":"Differentiating presence in virtual reality using physiological signals","authors":"Shuvodeep Saha ,&nbsp;Chelsea Dobbins ,&nbsp;Anubha Gupta ,&nbsp;Arindam Dey","doi":"10.1016/j.pmcj.2025.102065","DOIUrl":"10.1016/j.pmcj.2025.102065","url":null,"abstract":"<div><div>Advancements in wearable technologies have made the use of physiological signals, such as Electrodermal Activity (EDA) and Heart Rate Variability (HRV), more prevalent for detecting changes in the autonomic nervous system within virtual reality (VR). However, the challenge lies in utilizing these signals to objectively detect presence in VR, which typically relies on self-reports that can be inherently biased. This paper addresses this issue and presents a study (<em>N</em>=26) that investigates the effect that different levels of presence has on physiological responses in VR. A neutral VR environment was created that incorporated three levels of presence (high, medium and low) that were invoked by tuning different parameters. Participants wore a wrist-worn wearable device that captured their physiological signals whilst they experienced each of these environments. Results indicated that tonic and phasic components of the EDA signal were significant in differentiating between the levels. Two novel features, constructed using both the phasic and tonic components of EDA, successfully differentiated between presence levels. Analysis of the HRV data illustrated a significant difference between the low and medium levels using the ratio between low frequency to high frequency.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"111 ","pages":"Article 102065"},"PeriodicalIF":3.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144134125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LiteFlex-YOLO:A lightweight small target detection network for maritime unmanned aerial vehicles LiteFlex-YOLO:用于海上无人机的轻型小型目标探测网络
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 Epub Date: 2025-05-22 DOI: 10.1016/j.pmcj.2025.102064
Peng Tang, Yong Zhang
With frequent maritime activities, the number of overboard accidents at sea has increased, and rescue delays often lead to people being killed. Unmanned Aerial Vehicles (UAVs) have the advantages of fast localization and real-time monitoring in rescue, but the images taken by UAVs have many small targets, and the detection accuracy is insufficient; at the same time, target detection algorithms are difficult to be deployed due to the limitation of computational resources of UAVs. For this reason, this paper proposes a lightweight target detection model based on YOLOv8s improvement, LiteFlex-YOLO, which aims to improve the performance of target detection in UAVs sea rescue. Firstly, the small target sensing ability of the model is enhanced by introducing the P2 small target detection layer, secondly, replacing the C2f module with the lightweight C2fCIB module reduces the computational complexity to make the model more lightweight, furthermore, the feature extraction ability of the backbone is enhanced by using the ODConv (Omni-Dimensional Dynamic Convolution); Lastly, the attention mechanism of SimAM (Simple Attention Module) is introduced to enhance the attention of the key feature information. The final experimental results showed that, LiteFlex-YOLO achieves a [email protected] of 69.5% on the SeaDronesSee dataset, which is 18.2% improvement compared to YOLOv8s, and the model parameters are reduced to 71.2% of YOLOv8s. Moreover, compared with other SOTA algorithms, LiteFlex-YOLO performs excellently in small object detection accuracy, model lightweighting, and robustness.
随着海上活动的频繁,海上落水事故增多,救援延误往往导致人员死亡。无人机在救援中具有快速定位和实时监控的优点,但无人机拍摄的图像中小目标较多,检测精度不足;同时,由于无人机计算资源的限制,目标检测算法难以部署。为此,本文提出了一种基于YOLOv8s改进的轻型目标检测模型LiteFlex-YOLO,旨在提高无人机海上救援目标检测性能。首先,通过引入P2小目标检测层,增强了模型的小目标感知能力;其次,用轻量化的C2fCIB模块取代C2f模块,降低了计算复杂度,使模型更加轻量化;进一步,利用ODConv(全维动态卷积)增强了主干的特征提取能力;最后,引入SimAM (Simple attention Module)的注意机制,增强对关键特征信息的注意。最终实验结果表明,LiteFlex-YOLO在SeaDronesSee数据集上达到了69.5%的[email protected],比YOLOv8s提高了18.2%,模型参数降低到YOLOv8s的71.2%。此外,与其他SOTA算法相比,LiteFlex-YOLO在小目标检测精度、模型轻量化和鲁棒性方面表现优异。
{"title":"LiteFlex-YOLO:A lightweight small target detection network for maritime unmanned aerial vehicles","authors":"Peng Tang,&nbsp;Yong Zhang","doi":"10.1016/j.pmcj.2025.102064","DOIUrl":"10.1016/j.pmcj.2025.102064","url":null,"abstract":"<div><div>With frequent maritime activities, the number of overboard accidents at sea has increased, and rescue delays often lead to people being killed. Unmanned Aerial Vehicles (UAVs) have the advantages of fast localization and real-time monitoring in rescue, but the images taken by UAVs have many small targets, and the detection accuracy is insufficient; at the same time, target detection algorithms are difficult to be deployed due to the limitation of computational resources of UAVs. For this reason, this paper proposes a lightweight target detection model based on YOLOv8s improvement, LiteFlex-YOLO, which aims to improve the performance of target detection in UAVs sea rescue. Firstly, the small target sensing ability of the model is enhanced by introducing the P2 small target detection layer, secondly, replacing the C2f module with the lightweight C2fCIB module reduces the computational complexity to make the model more lightweight, furthermore, the feature extraction ability of the backbone is enhanced by using the ODConv (Omni-Dimensional Dynamic Convolution); Lastly, the attention mechanism of SimAM (Simple Attention Module) is introduced to enhance the attention of the key feature information. The final experimental results showed that, LiteFlex-YOLO achieves a [email protected] of 69.5% on the SeaDronesSee dataset, which is 18.2% improvement compared to YOLOv8s, and the model parameters are reduced to 71.2% of YOLOv8s. Moreover, compared with other SOTA algorithms, LiteFlex-YOLO performs excellently in small object detection accuracy, model lightweighting, and robustness.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"111 ","pages":"Article 102064"},"PeriodicalIF":3.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144125069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Would you mind hiding my malware? Building malicious Android apps with StegoPack 你介意把我的恶意软件藏起来吗?使用StegoPack构建恶意Android应用程序
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 Epub Date: 2025-05-09 DOI: 10.1016/j.pmcj.2025.102060
Danilo Dell’Orco , Giorgio Bernardinetti , Giuseppe Bianchi , Alessio Merlo , Alessandro Pellegrini
This paper empirically explores the resilience of the current Android ecosystem against stegomalware, which involves both Java/Kotlin and native code. To this aim, we rely on a methodology that goes beyond traditional approaches by hiding malicious Java code and extending it to encoding and dynamically loading native libraries at runtime. By merging app resources, steganography, and repackaging, the methodology seamlessly embeds malware samples into the assets of a host app, making detection significantly more challenging. We implemented the methodology in a tool, StegoPack, which allows the extraction and execution of the payload at runtime through reverse steganography. We used StegoPack to embed well-known DEX and native malware samples over 14 years into real Android host apps. We then challenged top-notch antivirus engines, which previously had high detection rates on the original malware, to detect the embedded samples. Our results reveal a significant reduction in the number of detections (up to zero in most cases), indicating that current detection techniques, while thorough in analyzing app code, largely disregard app assets, leading us to believe that steganographic adversaries are not even included in the adversary models of most deployed defensive analysis systems. Thus, we propose potential countermeasures for StegoPack to detect steganographic data in the app assets and the dynamic loader used to execute malware.
本文从经验上探讨了当前Android生态系统对隐恶意软件(涉及Java/Kotlin和本地代码)的弹性。为了实现这一目标,我们依赖于一种超越传统方法的方法,通过隐藏恶意Java代码并将其扩展为在运行时编码和动态加载本机库。通过合并应用程序资源,隐写和重新包装,该方法无缝地将恶意软件样本嵌入到主机应用程序的资产中,使检测更具挑战性。我们在工具StegoPack中实现了该方法,该工具允许通过反向隐写术在运行时提取和执行有效负载。我们使用StegoPack将知名的DEX和本地恶意软件样本嵌入到真正的Android主机应用程序中。然后,我们挑战了顶尖的反病毒引擎,这些引擎以前对原始恶意软件的检测率很高,以检测嵌入的样本。我们的研究结果显示,检测数量显著减少(大多数情况下为零),这表明当前的检测技术虽然在分析应用程序代码时非常彻底,但在很大程度上忽略了应用程序资产,这使我们相信,大多数部署的防御分析系统的对手模型中甚至不包括隐写术对手。因此,我们提出了StegoPack检测应用程序资产中的隐写数据和用于执行恶意软件的动态加载程序的潜在对策。
{"title":"Would you mind hiding my malware? Building malicious Android apps with StegoPack","authors":"Danilo Dell’Orco ,&nbsp;Giorgio Bernardinetti ,&nbsp;Giuseppe Bianchi ,&nbsp;Alessio Merlo ,&nbsp;Alessandro Pellegrini","doi":"10.1016/j.pmcj.2025.102060","DOIUrl":"10.1016/j.pmcj.2025.102060","url":null,"abstract":"<div><div>This paper empirically explores the resilience of the current Android ecosystem against stegomalware, which involves both Java/Kotlin and native code. To this aim, we rely on a methodology that goes beyond traditional approaches by hiding malicious Java code and extending it to encoding and dynamically loading native libraries at runtime. By merging app resources, steganography, and repackaging, the methodology seamlessly embeds malware samples into the assets of a host app, making detection significantly more challenging. We implemented the methodology in a tool, StegoPack, which allows the extraction and execution of the payload at runtime through reverse steganography. We used StegoPack to embed well-known DEX and native malware samples over 14 years into real Android host apps. We then challenged top-notch antivirus engines, which previously had high detection rates on the original malware, to detect the embedded samples. Our results reveal a significant reduction in the number of detections (up to zero in most cases), indicating that current detection techniques, while thorough in analyzing app code, largely disregard app assets, leading us to believe that steganographic adversaries are not even included in the adversary models of most deployed defensive analysis systems. Thus, we propose potential countermeasures for StegoPack to detect steganographic data in the app assets and the dynamic loader used to execute malware.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"111 ","pages":"Article 102060"},"PeriodicalIF":3.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144068520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resilient UAVs location sharing service based on information freshness and opportunistic deliveries 基于信息新鲜度和机会交付的弹性无人机位置共享服务
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 Epub Date: 2025-05-28 DOI: 10.1016/j.pmcj.2025.102066
Agnaldo de Souza Batista , Aldri Luiz dos Santos
Unmanned aerial vehicles (UAV) have been recognized as a versatile platform for various services. During the flight, these vehicles must avoid collisions to operate safely. In this way, they demand to keep spatial awareness, i.e., to know others in their coverage area. However, mobility and positioning hamper building UAV network infrastructure to support reliable basic services. Thus, such vehicles call for a location service with up-to-date information resilient to false location injection threats. This work proposes FlySafe, a resilient UAV location-sharing service that employs opportunistic approaches to deliver UAVs’ location. FlySafe takes into account the freshness of UAVs’ location to maintain their spatial awareness. Further, it counts on the age of the UAV’s location information to trigger device discovery. Simulation results showed that FlySafe achieved spatial awareness up to 94.15% of UAV operations, being resilient to false locations injected in the network. Moreover, the accuracy in device discovery achieved 94.53% with a location error of less than 2 m.
无人驾驶飞行器(UAV)已经被认为是一个用于各种服务的通用平台。在飞行过程中,这些飞行器必须避免碰撞才能安全运行。通过这种方式,他们需要保持空间意识,即了解其覆盖区域内的其他人。然而,机动性和定位阻碍了建立无人机网络基础设施来支持可靠的基本服务。因此,此类车辆需要具有最新信息的位置服务,以抵御虚假位置注入威胁。这项工作提出了FlySafe,这是一种弹性无人机位置共享服务,采用机会主义方法提供无人机的位置。FlySafe考虑了无人机位置的新鲜度,以保持其空间感知。此外,它依靠无人机的位置信息的年龄来触发设备发现。仿真结果表明,FlySafe在无人机操作中实现了高达94.15%的空间感知,对网络中注入的错误位置具有弹性。发现精度达到94.53%,定位误差小于2 m。
{"title":"Resilient UAVs location sharing service based on information freshness and opportunistic deliveries","authors":"Agnaldo de Souza Batista ,&nbsp;Aldri Luiz dos Santos","doi":"10.1016/j.pmcj.2025.102066","DOIUrl":"10.1016/j.pmcj.2025.102066","url":null,"abstract":"<div><div>Unmanned aerial vehicles (UAV) have been recognized as a versatile platform for various services. During the flight, these vehicles must avoid collisions to operate safely. In this way, they demand to keep spatial awareness, i.e., to know others in their coverage area. However, mobility and positioning hamper building UAV network infrastructure to support reliable basic services. Thus, such vehicles call for a location service with up-to-date information resilient to false location injection threats. This work proposes FlySafe, a resilient UAV location-sharing service that employs opportunistic approaches to deliver UAVs’ location. FlySafe takes into account the freshness of UAVs’ location to maintain their spatial awareness. Further, it counts on the age of the UAV’s location information to trigger device discovery. Simulation results showed that FlySafe achieved spatial awareness up to 94.15% of UAV operations, being resilient to false locations injected in the network. Moreover, the accuracy in device discovery achieved 94.53% with a location error of less than 2 m.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"111 ","pages":"Article 102066"},"PeriodicalIF":3.0,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144184361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Continual learning in sensor-based human activity recognition with dynamic mixture of experts 基于动态混合专家的基于传感器的人类活动识别的持续学习
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-01 Epub Date: 2025-04-04 DOI: 10.1016/j.pmcj.2025.102044
Fahrurrozi Rahman, Martin Schiemer, Andrea Rosales Sanabria, Juan Ye
Human activity recognition (HAR) is a key enabler for many applications in healthcare, factory automation, and smart home. It detects and predicts human behaviours or daily activities via a range of wearable sensors or ambient sensors embedded in an environment. As more and more HAR applications are deployed in the real-world environments, there is a pressing need for the ability of continually and incrementally learning new activities over time without retraining the HAR model. Recently, various continual learning techniques have been applied to HAR; however, most of them commit to a large architecture, which might not suit to devices that deploy HAR models. In addition, these techniques often require to deploy the same large architecture on the devices and cannot customise the architecture for different requirements. To tackle this challenge, we present a dynamic mixture-of-experts approach, which grows an expert for each new task and allows flexible composition of experts to suit individual needs of applications. We have empirically evaluated our technique on 4 third-party, publicly available datasets and compared with 11 state-of-the-art continual learning techniques. Our results demonstrate that our technique can achieve better or comparable performance but with much less parameter spaces and training time.
人类活动识别(HAR)是医疗保健、工厂自动化和智能家居中许多应用程序的关键推动因素。它通过一系列可穿戴传感器或嵌入环境中的环境传感器来检测和预测人类的行为或日常活动。随着越来越多的HAR应用程序部署在现实环境中,迫切需要在不重新训练HAR模型的情况下,不断地、增量地学习新活动的能力。最近,各种持续学习技术被应用于HAR;然而,它们中的大多数都致力于大型架构,这可能不适合部署HAR模型的设备。此外,这些技术通常需要在设备上部署相同的大型体系结构,并且不能针对不同的需求定制体系结构。为了应对这一挑战,我们提出了一种动态的专家混合方法,该方法为每个新任务培养一名专家,并允许专家的灵活组合以适应各个应用程序的需求。我们在4个第三方公开数据集上对我们的技术进行了实证评估,并与11种最先进的持续学习技术进行了比较。我们的结果表明,我们的技术可以达到更好或相当的性能,但参数空间和训练时间要少得多。
{"title":"Continual learning in sensor-based human activity recognition with dynamic mixture of experts","authors":"Fahrurrozi Rahman,&nbsp;Martin Schiemer,&nbsp;Andrea Rosales Sanabria,&nbsp;Juan Ye","doi":"10.1016/j.pmcj.2025.102044","DOIUrl":"10.1016/j.pmcj.2025.102044","url":null,"abstract":"<div><div>Human activity recognition (HAR) is a key enabler for many applications in healthcare, factory automation, and smart home. It detects and predicts human behaviours or daily activities via a range of wearable sensors or ambient sensors embedded in an environment. As more and more HAR applications are deployed in the real-world environments, there is a pressing need for the ability of continually and incrementally learning new activities over time without retraining the HAR model. Recently, various continual learning techniques have been applied to HAR; however, most of them commit to a large architecture, which might not suit to devices that deploy HAR models. In addition, these techniques often require to deploy the same large architecture on the devices and cannot customise the architecture for different requirements. To tackle this challenge, we present a dynamic mixture-of-experts approach, which grows an expert for each new task and allows flexible composition of experts to suit individual needs of applications. We have empirically evaluated our technique on 4 third-party, publicly available datasets and compared with 11 state-of-the-art continual learning techniques. Our results demonstrate that our technique can achieve better or comparable performance but with much less parameter spaces and training time.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"110 ","pages":"Article 102044"},"PeriodicalIF":3.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143792171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EdgePlantNet: Lightweight edge-aware cyber–physical system for plant disease detection using enhanced attention CNNs EdgePlantNet:轻量级边缘感知网络物理系统,用于植物病害检测,使用增强的关注cnn
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-01 Epub Date: 2025-04-25 DOI: 10.1016/j.pmcj.2025.102059
Mohammad Zeeshan , Maryam Shojaei Baghini , Ankur Pandey
The advances in sensing and computing methodologies have allowed ubiquitous Cyber–Physical Systems (CPS) which have enabled intelligent monitoring and management of crop plants, leading to Smart Agriculture. Yet, the computational constraints of the edge-computing devices have been a roadblock for utilization of complex processing algorithms for real-time applications like leaf-disease detection, were immediate and highly accurate results are of paramount importance. To address this, we propose EdgePlantNet, a Lightweight Edge-Aware CPS for Plant Disease Detection using Enhanced Attention CNNs. It comprises a novel dual-branched Convolutional Neural Network (CNN) architecture that incorporates an improved multi-layered perceptron based spatial attention mechanism (MLP-ATCNN). The MLP-ATCNN is fed with both the original leaf image and its segmented copy, allowing it to simultaneously focus on the leaf image at two scales namely, the diseased regions, and the overall leaf. This allows it to learn robust discriminatory features corresponding to different diseases, even when trained with much lower samples of data. We validate the performance of the EdgePlantNet on two popular and diverse datasets that are the PlantVillage and the BPLD dataset. The novelty of our proposed CPS much lower computational complexity and high disease detection accuracy as compared to other state-of-the-art methods. We also implement the EdgePlantNet on a resource constraint IoT edge device, demonstrating its efficiency for mobile computing.
传感和计算方法的进步使无处不在的信息物理系统(CPS)成为可能,它使农作物的智能监测和管理成为可能,从而实现智能农业。然而,边缘计算设备的计算限制一直是利用复杂处理算法进行实时应用(如叶片病害检测)的障碍,而即时和高度准确的结果至关重要。为了解决这个问题,我们提出了EdgePlantNet,一个轻量级的边缘感知CPS,用于使用增强的关注cnn进行植物病害检测。它包括一种新的双分支卷积神经网络(CNN)架构,该架构结合了一种改进的基于多层感知器的空间注意机制(MLP-ATCNN)。MLP-ATCNN同时被输入原始叶片图像和其分割的副本,使其能够同时在两个尺度上聚焦叶片图像,即患病区域和整体叶片。这使得它能够学习到与不同疾病相对应的强大的歧视性特征,即使在使用更少的数据样本进行训练时也是如此。我们验证了EdgePlantNet在两个流行的不同数据集上的性能,这两个数据集是PlantVillage和BPLD数据集。与其他最先进的方法相比,我们提出的CPS的新颖性大大降低了计算复杂度和较高的疾病检测精度。我们还在资源受限的物联网边缘设备上实现了EdgePlantNet,展示了其在移动计算中的效率。
{"title":"EdgePlantNet: Lightweight edge-aware cyber–physical system for plant disease detection using enhanced attention CNNs","authors":"Mohammad Zeeshan ,&nbsp;Maryam Shojaei Baghini ,&nbsp;Ankur Pandey","doi":"10.1016/j.pmcj.2025.102059","DOIUrl":"10.1016/j.pmcj.2025.102059","url":null,"abstract":"<div><div>The advances in sensing and computing methodologies have allowed ubiquitous Cyber–Physical Systems (CPS) which have enabled intelligent monitoring and management of crop plants, leading to Smart Agriculture. Yet, the computational constraints of the edge-computing devices have been a roadblock for utilization of complex processing algorithms for real-time applications like leaf-disease detection, were immediate and highly accurate results are of paramount importance. To address this, we propose EdgePlantNet, a Lightweight Edge-Aware CPS for Plant Disease Detection using Enhanced Attention CNNs. It comprises a novel dual-branched Convolutional Neural Network (CNN) architecture that incorporates an improved multi-layered perceptron based spatial attention mechanism (MLP-ATCNN). The MLP-ATCNN is fed with both the original leaf image and its segmented copy, allowing it to simultaneously focus on the leaf image at two scales namely, the diseased regions, and the overall leaf. This allows it to learn robust discriminatory features corresponding to different diseases, even when trained with much lower samples of data. We validate the performance of the EdgePlantNet on two popular and diverse datasets that are the PlantVillage and the BPLD dataset. The novelty of our proposed CPS much lower computational complexity and high disease detection accuracy as compared to other state-of-the-art methods. We also implement the EdgePlantNet on a resource constraint IoT edge device, demonstrating its efficiency for mobile computing.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"110 ","pages":"Article 102059"},"PeriodicalIF":3.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143899007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A black-box assessment of authentication and reliability in consumer IoT devices 消费者物联网设备认证和可靠性的黑盒评估
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-01 Epub Date: 2025-04-08 DOI: 10.1016/j.pmcj.2025.102045
Sara Lazzaro , Vincenzo De Angelis , Anna Maria Mandalari , Francesco Buccafurri
In the context of consumer Internet of Things (IoT) devices, the identification of vulnerabilities is becoming increasingly relevant. In this paper, we propose a scalable black-box assessment methodology for identifying authentication and reliability issues in IoT devices without the need for prior knowledge of device models or communication protocols. Our methodology consists of a suite of five black-box tests focusing on two specific aspects: authentication and reliability. One of these tests required the development of a tool, called REPLIOT, specifically aimed at discovering replay attacks on the local network. To the best of our knowledge, the development of such a tool is a significant contribution, as there was no similar tool previously available in the literature. We applied these tests to a testbed consisting of 51 consumer IoT devices. Our experiments reveal that 88% of the tested devices fail at least one of the proposed tests. Further manual investigation reveals severe implications of these results in terms of privacy, security, and reliability. Our findings underline a strong need to improve consumer IoT devices security practices to minimize these potential risks and protect smart home environments.
在消费者物联网(IoT)设备的背景下,漏洞识别变得越来越重要。在本文中,我们提出了一种可扩展的黑盒评估方法,用于识别物联网设备中的身份验证和可靠性问题,而无需事先了解设备模型或通信协议。我们的方法包括一套五个黑盒测试,重点关注两个特定方面:身份验证和可靠性。其中一项测试需要开发一种名为REPLIOT的工具,专门用于发现本地网络上的重放攻击。据我们所知,这样一个工具的发展是一个重要的贡献,因为没有类似的工具以前可用的文献。我们将这些测试应用到一个由51个消费物联网设备组成的测试平台上。我们的实验表明,88%的测试设备至少不能通过一项建议的测试。进一步的手工调查揭示了这些结果在隐私、安全性和可靠性方面的严重影响。我们的研究结果强调了改善消费者物联网设备安全实践的强烈需求,以最大限度地减少这些潜在风险并保护智能家居环境。
{"title":"A black-box assessment of authentication and reliability in consumer IoT devices","authors":"Sara Lazzaro ,&nbsp;Vincenzo De Angelis ,&nbsp;Anna Maria Mandalari ,&nbsp;Francesco Buccafurri","doi":"10.1016/j.pmcj.2025.102045","DOIUrl":"10.1016/j.pmcj.2025.102045","url":null,"abstract":"<div><div>In the context of consumer Internet of Things (IoT) devices, the identification of vulnerabilities is becoming increasingly relevant. In this paper, we propose a scalable black-box assessment methodology for identifying authentication and reliability issues in IoT devices without the need for prior knowledge of device models or communication protocols. Our methodology consists of a suite of five black-box tests focusing on two specific aspects: authentication and reliability. One of these tests required the development of a tool, called REPLIOT, specifically aimed at discovering replay attacks on the local network. To the best of our knowledge, the development of such a tool is a significant contribution, as there was no similar tool previously available in the literature. We applied these tests to a testbed consisting of 51 consumer IoT devices. Our experiments reveal that 88% of the tested devices fail at least one of the proposed tests. Further manual investigation reveals severe implications of these results in terms of privacy, security, and reliability. Our findings underline a strong need to improve consumer IoT devices security practices to minimize these potential risks and protect smart home environments.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"110 ","pages":"Article 102045"},"PeriodicalIF":3.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143821505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized secure and energy-efficient approach for IoT-enabled wireless sensor networks 为支持物联网的无线传感器网络优化安全和节能方法
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-01 Epub Date: 2025-04-07 DOI: 10.1016/j.pmcj.2025.102049
Jay Kumar Jain , Dipti Chauhan
Wireless communication is pivotal in the modern era, enabling seamless connectivity across diverse applications. However, the increasing complexity and sophistication of cyber threats pose significant challenges to the security of wireless communication systems. This paper proposes an innovative approach to enhance wireless communication security through integrating artificial intelligence (AI) techniques. First, we construct the network using the Horizontal Partitioning Sierpinski Triangle to reduce the network's high traffic and perform the authentication process. After successful authentication, we perform the clustering process and Game Theory-Driven Clustering (GT-DC) allows nodes to strategically optimize energy utilization while forming clusters as rational entities in a cooperative game. Perform the beacon injection and detect the attacks using the Improved Random Forest (IRF) that signifies the accurate identification of cyber-attacks, IRF is improving the Bootstrap Sampling, Class Weights, and Anomaly Score Threshold. In Routing implement Improved Cache LEACH Protocol (ICLP) which discovers the effective routing establishing the Cache nodes (Cn), to obtain optimal routing by lowering latency, improving data access, enhancing data reliability, and reducing data redundancy. The proposed work is compared with evaluation metrics such as authentication time, throughput, attack detection rate, energy consumption, packet delivery rate, and delay.
无线通信在现代时代至关重要,它可以实现跨各种应用程序的无缝连接。然而,日益复杂和复杂的网络威胁给无线通信系统的安全带来了重大挑战。本文提出了一种通过集成人工智能(AI)技术来增强无线通信安全性的创新方法。首先,我们使用水平分区的Sierpinski三角形构造网络,以减少网络的高流量,并执行认证过程。在认证成功后,我们执行聚类过程,博弈论驱动聚类(GT-DC)允许节点在合作博弈中作为理性实体形成集群的同时战略性地优化能源利用。执行信标注入并使用改进的随机森林(IRF)检测攻击,这意味着准确识别网络攻击,IRF正在改进Bootstrap采样,类权重和异常分数阈值。在路由方面,采用ICLP (Improved Cache LEACH Protocol)协议,通过建立缓存节点Cn (Cache nodes)来发现有效的路由,从而通过降低时延、提高数据访问、提高数据可靠性和减少数据冗余来获得最优路由。并与认证时间、吞吐量、攻击检测率、能耗、报文发送速率、时延等评估指标进行了比较。
{"title":"Optimized secure and energy-efficient approach for IoT-enabled wireless sensor networks","authors":"Jay Kumar Jain ,&nbsp;Dipti Chauhan","doi":"10.1016/j.pmcj.2025.102049","DOIUrl":"10.1016/j.pmcj.2025.102049","url":null,"abstract":"<div><div>Wireless communication is pivotal in the modern era, enabling seamless connectivity across diverse applications. However, the increasing complexity and sophistication of cyber threats pose significant challenges to the security of wireless communication systems. This paper proposes an innovative approach to enhance wireless communication security through integrating artificial intelligence (AI) techniques. First, we construct the network using the Horizontal Partitioning Sierpinski Triangle to reduce the network's high traffic and perform the authentication process. After successful authentication, we perform the clustering process and Game Theory-Driven Clustering (GT-DC) allows nodes to strategically optimize energy utilization while forming clusters as rational entities in a cooperative game. Perform the beacon injection and detect the attacks using the Improved Random Forest (IRF) that signifies the accurate identification of cyber-attacks, IRF is improving the Bootstrap Sampling, Class Weights, and Anomaly Score Threshold. In Routing implement Improved Cache LEACH Protocol (ICLP) which discovers the effective routing establishing the Cache nodes (Cn), to obtain optimal routing by lowering latency, improving data access, enhancing data reliability, and reducing data redundancy. The proposed work is compared with evaluation metrics such as authentication time, throughput, attack detection rate, energy consumption, packet delivery rate, and delay.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"110 ","pages":"Article 102049"},"PeriodicalIF":3.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143829093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed fault detection in sparse wireless sensor networks utilizing simultaneous likelihood ratio statistics 基于同时似然比统计的稀疏无线传感器网络分布式故障检测
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-01 Epub Date: 2025-03-31 DOI: 10.1016/j.pmcj.2025.102043
Bhabani Sankar Gouda , Trilochan Panigrahi , Sudhakar Das , Meenakshi Panda , Linga Reddy Cenkeramaddi
Sensor nodes in wireless sensor networks (WSNs) for several remote applications are deployed in harsh environments and are coupled with low-cost components. Because of these factors, sensor nodes are becoming faulty, resulting in serious data inaccuracy in the network if not diagnosed in a timely manner. The current approaches to centralized or distributed fault detection algorithms are based on statistical methods or machine learning algorithms. Statistical methods require more data to achieve the desired detection accuracy and may be impractical for sparse networks. Machine learning approaches are computationally demanding. We know that the mean and variance of data from a faulty node differ from those from a healthy node. As a result, simultaneous likelihood ratio statistics are proposed here to determine the sensor node’s fault status in WSNs. The proposed hybrid method, in which the faulty status of the node connected to the anchor node is diagnosed by the anchor node, assumes that the anchor node has statistics for all connected nodes. During the diagnosis time, the simultaneous likelihood ratio statistics (SLRS) are computed using the data received by the anchor node over a specific time period. The fault status is determined by comparing the likelihood ratio to a predetermined threshold based on the tolerance limit. The algorithm’s performance is determined and compared to state-of-the-art algorithms using real-time measured data from the literature.
用于多个远程应用的无线传感器网络(wsn)中的传感器节点部署在恶劣的环境中,并与低成本组件相结合。由于这些因素的影响,传感器节点出现故障,如果不及时诊断,会导致网络中数据严重不准确。目前的集中式或分布式故障检测算法是基于统计方法或机器学习算法。统计方法需要更多的数据来达到期望的检测精度,并且对于稀疏网络可能不切实际。机器学习方法的计算要求很高。我们知道来自故障节点的数据的均值和方差不同于来自健康节点的数据。因此,本文提出了同步似然比统计来确定wsn中传感器节点的故障状态。提出的混合方法假设锚节点具有所有连接节点的统计信息,即锚节点对连接到锚节点的节点的故障状态进行诊断。在诊断期间,使用锚节点在特定时间段内接收的数据计算同时似然比统计(SLRS)。通过将似然比与基于容限的预定阈值进行比较,确定故障状态。该算法的性能被确定,并与使用文献中实时测量数据的最先进算法进行比较。
{"title":"Distributed fault detection in sparse wireless sensor networks utilizing simultaneous likelihood ratio statistics","authors":"Bhabani Sankar Gouda ,&nbsp;Trilochan Panigrahi ,&nbsp;Sudhakar Das ,&nbsp;Meenakshi Panda ,&nbsp;Linga Reddy Cenkeramaddi","doi":"10.1016/j.pmcj.2025.102043","DOIUrl":"10.1016/j.pmcj.2025.102043","url":null,"abstract":"<div><div>Sensor nodes in wireless sensor networks (WSNs) for several remote applications are deployed in harsh environments and are coupled with low-cost components. Because of these factors, sensor nodes are becoming faulty, resulting in serious data inaccuracy in the network if not diagnosed in a timely manner. The current approaches to centralized or distributed fault detection algorithms are based on statistical methods or machine learning algorithms. Statistical methods require more data to achieve the desired detection accuracy and may be impractical for sparse networks. Machine learning approaches are computationally demanding. We know that the mean and variance of data from a faulty node differ from those from a healthy node. As a result, simultaneous likelihood ratio statistics are proposed here to determine the sensor node’s fault status in WSNs. The proposed hybrid method, in which the faulty status of the node connected to the anchor node is diagnosed by the anchor node, assumes that the anchor node has statistics for all connected nodes. During the diagnosis time, the simultaneous likelihood ratio statistics (SLRS) are computed using the data received by the anchor node over a specific time period. The fault status is determined by comparing the likelihood ratio to a predetermined threshold based on the tolerance limit. The algorithm’s performance is determined and compared to state-of-the-art algorithms using real-time measured data from the literature.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"110 ","pages":"Article 102043"},"PeriodicalIF":3.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143785287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey of wearable devices to capture human factors for human-robot collaboration 一项可穿戴设备的调查,以捕捉人机协作的人为因素
IF 3 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-01 Epub Date: 2025-04-21 DOI: 10.1016/j.pmcj.2025.102048
Hooman Sarvghadi , Andreas Reinhardt , Esther A. Semmelhack
Technology has rapidly evolved over the course of the last decades, and drastically transformed our way of life. Robots are no longer just mechanical aides, but have become collaborators on many tasks. Wearable gadgets have become virtually ubiquitous due to their ability to collect data, monitor health parameters, and assist users in various day-to-day tasks. In recent years, there has been a surge in interest around the use of wearable technologies to collect human psychological parameters for human–robot collaboration. With the field of robotics advancing, there is a growing need for robots to interact with humans seamlessly. To achieve this seamless human–robot connection, robots must be able to interpret human emotions and react appropriately. While understanding human emotions and behavior is a complex task in itself, wearable sensor systems contribute valuable insights. This survey provides a comprehensive overview of wearable gadgets and technologies proposed for measuring five key human factors — trust, cognitive workload, stress, safety perception, and fatigue — within the scope of human–robot collaboration, based on the systematic review of papers published between 2015 and the end of 2024 in six major databases. Our analysis indicates that trust and cognitive workload have received greater attention from researchers in recent years, as compared to other human factors. The Empatica E4 wristband, Shimmer3 GSR+ and EPOC X EEG headset are among the most widely used wearable devices, capable of capturing essential physiological parameters widely used for human–robot collaboration, including electrodermal activity, heart rate variability, skin temperature, and electroencephalogram. Besides reviewing the potentials and capabilities of these gadgets, we highlight their shortcomings and offer directions for future research in this domain.
在过去的几十年里,科技迅速发展,彻底改变了我们的生活方式。机器人不再仅仅是机械助手,而是在许多任务中成为合作者。由于可穿戴设备能够收集数据、监测健康参数并协助用户完成各种日常任务,因此它们几乎无处不在。近年来,人们对使用可穿戴技术来收集人类心理参数以进行人机协作的兴趣激增。随着机器人领域的发展,人们对机器人与人类无缝互动的需求越来越大。为了实现这种无缝的人机连接,机器人必须能够理解人类的情感并做出适当的反应。虽然理解人类的情绪和行为本身就是一项复杂的任务,但可穿戴传感器系统提供了有价值的见解。本调查基于对2015年至2024年底在六个主要数据库中发表的论文的系统综述,全面概述了可穿戴设备和技术,这些设备和技术用于测量人机协作范围内的五个关键人为因素——信任、认知工作量、压力、安全感知和疲劳。我们的分析表明,与其他人为因素相比,信任和认知工作量近年来受到了研究人员的更多关注。Empatica E4腕带、Shimmer3 GSR+和EPOC X EEG耳机是应用最广泛的可穿戴设备,能够捕获广泛用于人机协作的基本生理参数,包括皮电活动、心率变率、皮肤温度和脑电图。除了回顾这些小工具的潜力和能力外,我们还指出了它们的不足之处,并提出了该领域未来的研究方向。
{"title":"A survey of wearable devices to capture human factors for human-robot collaboration","authors":"Hooman Sarvghadi ,&nbsp;Andreas Reinhardt ,&nbsp;Esther A. Semmelhack","doi":"10.1016/j.pmcj.2025.102048","DOIUrl":"10.1016/j.pmcj.2025.102048","url":null,"abstract":"<div><div>Technology has rapidly evolved over the course of the last decades, and drastically transformed our way of life. Robots are no longer just mechanical aides, but have become collaborators on many tasks. Wearable gadgets have become virtually ubiquitous due to their ability to collect data, monitor health parameters, and assist users in various day-to-day tasks. In recent years, there has been a surge in interest around the use of wearable technologies to collect human psychological parameters for human–robot collaboration. With the field of robotics advancing, there is a growing need for robots to interact with humans seamlessly. To achieve this seamless human–robot connection, robots must be able to interpret human emotions and react appropriately. While understanding human emotions and behavior is a complex task in itself, wearable sensor systems contribute valuable insights. This survey provides a comprehensive overview of wearable gadgets and technologies proposed for measuring five key human factors — trust, cognitive workload, stress, safety perception, and fatigue — within the scope of human–robot collaboration, based on the systematic review of papers published between 2015 and the end of 2024 in six major databases. Our analysis indicates that trust and cognitive workload have received greater attention from researchers in recent years, as compared to other human factors. The Empatica E4 wristband, Shimmer3 GSR+ and EPOC X EEG headset are among the most widely used wearable devices, capable of capturing essential physiological parameters widely used for human–robot collaboration, including electrodermal activity, heart rate variability, skin temperature, and electroencephalogram. Besides reviewing the potentials and capabilities of these gadgets, we highlight their shortcomings and offer directions for future research in this domain.</div></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":"110 ","pages":"Article 102048"},"PeriodicalIF":3.0,"publicationDate":"2025-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143869712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Pervasive and Mobile Computing
全部 J. Hydrol. ARCHAEOMETRY Clean-Soil Air Water Environ. Eng. Res. Environmental Control in Biology European journal of biochemistry Aquat. Geochem. Geosci. Front. GEOLOGY J. Atmos. Sol. Terr. Phys. EXPERT REV ANTICANC Acta Geophys. Org. Geochem. FETAL DIAGN THER Ocean Sci. ENVIRON HEALTH-GLOB Acta Geochimica ECOSYSTEMS Clean Technol. Environ. Policy Eur. J. Control TERR ATMOS OCEAN SCI GEOTECH LETT Erziehungswissenschaftliche Revue Ecol. Eng. Energy Storage Memai Heiko Igaku J. Adv. Model. Earth Syst. Atmos. Res. Surv. Geophys. Geol. Ore Deposits Am. J. Sci. Exp. Hematol. Oncol. GEOL BELG Eurasian Chemico-Technological Journal Environ. Educ. Res, Exp. Anim. Stud. Geophys. Geod. Focus on Autism and Other Developmental Disabilities Geochim. Cosmochim. Acta Int. J. Climatol. Energy Ecol Environ Ore Geol. Rev. Ocean Dyn. Proc. Yorkshire Geol. Soc. Environ. Res. Lett. Polar Sci. Turk. J. Earth Sci. EUR THYROID J Chem. Ecol. EUREKA: Physics and Engineering Geochem. Perspect. EXPERT OPIN DRUG DEL Environ. Mol. Mutagen. Annu. Rev. Earth Planet. Sci. Adv. Meteorol. Carbon Balance Manage. Environ. Pollut. Bioavailability Contrib. Mineral. Petrol. Int. J. Biometeorol. ACTA GEOL SIN-ENGL Environ. Eng. Sci. Adv. Atmos. Sci. ACTA GEOL POL Am. J. Phys. Anthropol. Geobiology AAPG Bull. ACTA PETROL SIN Appl. Clay Sci. ERN: Other Macroeconomics: Aggregative Models (Topic) Am. Mineral. Aust. J. Earth Sci. Ecol. Processes Basin Res. ENG SANIT AMBIENT Communications Earth & Environment Appl. Geochem. Energy Systems Pure Appl. Geophys. Environ. Geochem. Health ARCT ANTARCT ALP RES Int. J. Geomech. Essentials of Polymer Flooding Technique Atmos. Chem. Phys. ECOL RESTOR Clim. Change Asia-Pac. J. Atmos. Sci. Newsl. Stratigr. ERN: Other Microeconomics: General Equilibrium & Disequilibrium Models of Financial Markets (Topic) EUR RESPIR REV Engineering, Technology & Applied Science Research Environmental Health Insights EPISODES Quat. Int. GEOFIZIKA Espacio Tiempo y Forma. Serie VII, Historia del Arte Energy Environ. Big Earth Data COMP BIOCHEM PHYS C SCI CHINA EARTH SCI Ann. Glaciol.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1