首页 > 最新文献

Pervasive and Mobile Computing最新文献

英文 中文
Energy consumption of smartphones and IoT devices when using different versions of the HTTP protocol 智能手机和物联网设备在使用不同版本 HTTP 协议时的能耗
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-12-18 DOI: 10.1016/j.pmcj.2023.101871
Chiara Caiazza , Valerio Luconi , Alessio Vecchio

HTTP is frequently used by smartphones and IoT devices to access information and Web services. Nowadays, HTTP is used in three major versions, each introducing significant changes with respect to the previous one. We evaluated the energy consumption of the major versions of the HTTP protocol when used in the communication between energy-constrained devices and cloud-based or edge-based services. Experimental results show that in a machine-to-machine communication scenario, for the considered client devices – a smartphone and a Single Board Computer – and for a number of cloud/edge services and facilities, HTTP/3 frequently requires more energy than the previous versions of the protocol. The focus of our analysis is on machine-to-machine communication, but to obtain a broader view we also considered a client–server interaction pattern that is more browsing-like. In this case, HTTP/3 can be more energy efficient than the other versions.

智能手机和物联网设备经常使用 HTTP 访问信息和网络服务。目前,HTTP 有三个主要版本,每个版本都与前一个版本有很大不同。我们评估了主要版本的 HTTP 协议在能源受限设备与云端或边缘服务之间通信时的能耗。实验结果表明,在机器到机器的通信场景中,对于所考虑的客户端设备(智能手机和单板计算机)以及一些云/边缘服务和设施,HTTP/3 经常比以前版本的协议需要更多的能量。我们分析的重点是机器与机器之间的通信,但为了获得更广泛的视野,我们也考虑了更类似于浏览的客户端与服务器交互模式。在这种情况下,HTTP/3 可以比其他版本更节能。
{"title":"Energy consumption of smartphones and IoT devices when using different versions of the HTTP protocol","authors":"Chiara Caiazza ,&nbsp;Valerio Luconi ,&nbsp;Alessio Vecchio","doi":"10.1016/j.pmcj.2023.101871","DOIUrl":"10.1016/j.pmcj.2023.101871","url":null,"abstract":"<div><p>HTTP is frequently used by smartphones and IoT devices to access information and Web services. Nowadays, HTTP is used in three major versions, each introducing significant changes with respect to the previous one. We evaluated the energy consumption of the major versions of the HTTP protocol when used in the communication between energy-constrained devices and cloud-based or edge-based services. Experimental results show that in a machine-to-machine communication scenario, for the considered client devices – a smartphone and a Single Board Computer – and for a number of cloud/edge services and facilities, HTTP/3 frequently requires more energy than the previous versions of the protocol. The focus of our analysis is on machine-to-machine communication, but to obtain a broader view we also considered a client–server interaction pattern that is more browsing-like. In this case, HTTP/3 can be more energy efficient than the other versions.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1574119223001293/pdfft?md5=c73530019c8ccf2d77f8c4830f5951c0&pid=1-s2.0-S1574119223001293-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138742538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PDCHAR: Human activity recognition via multi-sensor wearable networks using two-channel convolutional neural networks PDC-HAR:利用双通道卷积神经网络通过多传感器可穿戴网络识别人类活动
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-12-13 DOI: 10.1016/j.pmcj.2023.101868
Yvxuan Ren, Dandan Zhu, Kai Tong, Lulu Xv, Zhengtai Wang, Lixin Kang, Jinguo Chai

Realizing human activity recognition is an important issue in pedestrian navigation and intelligent prosthetic control. Utilizing miniature multi-sensor wearable networks is a reliable method to improve the efficiency and convenience of the recognition system. Effective feature extraction and fusion of multimodal signals is a key issue in recognition. Therefore, this paper proposes an enhanced algorithm based on PCA sensor coupling analysis for data preprocessing. Subsequently, an innovative two-channel convolutional neural network with an SPF feature fusion layer as the core is built. The network fully analyzes the local and global features of multimodal signals using the local contrast and luminance properties of feature images. Compared with traditional methods, the model can reduce the data dimensionality and automatically identify and fuse the key information of the signals. In addition, most of the current mode recognition only supports simple actions such as walking and running, this paper constructs a database containing sixteen states by building a network with inertial sensors (IMU), curvature sensors (FLEX) and electromyography sensors (EMG). The experimental results show that the proposed system exhibits better results in complex action recognition and provides a new scheme for the realization of feature fusion and enhancement.

实现人类活动识别是行人导航和智能假肢控制中的一个重要问题。利用微型多传感器可穿戴网络是提高识别系统效率和便利性的可靠方法。对多模态信号进行有效的特征提取和融合是识别中的一个关键问题。因此,本文提出了一种基于 PCA 传感器耦合分析的增强算法,用于数据预处理。随后,构建了以 SPF 特征融合层为核心的创新型双通道卷积神经网络。该网络利用特征图像的局部对比度和亮度特性,全面分析多模态信号的局部和全局特征。与传统方法相比,该模型可以降低数据维度,自动识别和融合信号的关键信息。此外,目前的模式识别大多只支持行走和跑步等简单动作,本文通过建立一个包含惯性传感器(IMU)、曲率传感器(FLEX)和肌电传感器(EMG)的网络,构建了一个包含十六种状态的数据库。实验结果表明,所提出的系统在复杂动作识别方面表现出更好的效果,并为实现特征融合和增强提供了一种新方案。
{"title":"PDCHAR: Human activity recognition via multi-sensor wearable networks using two-channel convolutional neural networks","authors":"Yvxuan Ren,&nbsp;Dandan Zhu,&nbsp;Kai Tong,&nbsp;Lulu Xv,&nbsp;Zhengtai Wang,&nbsp;Lixin Kang,&nbsp;Jinguo Chai","doi":"10.1016/j.pmcj.2023.101868","DOIUrl":"10.1016/j.pmcj.2023.101868","url":null,"abstract":"<div><p>Realizing human activity recognition is an important issue in pedestrian navigation and intelligent prosthetic control. Utilizing miniature multi-sensor wearable networks is a reliable method to improve the efficiency and convenience of the recognition system. Effective feature extraction and fusion of multimodal signals is a key issue in recognition. Therefore, this paper proposes an enhanced algorithm based on PCA sensor coupling analysis for data preprocessing. Subsequently, an innovative two-channel convolutional neural network with an SPF feature fusion layer as the core is built. The network fully analyzes the local and global features of multimodal signals using the local contrast and luminance properties of feature images. Compared with traditional methods, the model can reduce the data dimensionality and automatically identify and fuse the key information of the signals. In addition, most of the current mode recognition only supports simple actions such as walking and running, this paper constructs a database containing sixteen states by building a network with inertial sensors (IMU), curvature sensors (FLEX) and electromyography sensors (EMG). The experimental results show that the proposed system exhibits better results in complex action recognition and provides a new scheme for the realization of feature fusion and enhancement.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138581597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tracking people across ultra populated indoor spaces by matching unreliable Wi-Fi signals with disconnected video feeds 通过将不可靠的Wi-Fi信号与断开的视频馈送相匹配,追踪人口密集的室内空间中的人
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-23 DOI: 10.1016/j.pmcj.2023.101860
Hai Truong , Dheryta Jaisinghani , Shubham Jain , Arunesh Sinha , JeongGil Ko , Rajesh Balan

Tracking in dense indoor environments where several thousands of people move around is an extremely challenging problem. In this paper, we present a system — DenseTrack for tracking people in such environments. DenseTrack leverages data from the sensing modalities that are already present in these environments — Wi-Fi (from enterprise network deployments) and Video (from surveillance cameras). We combine Wi-Fi information with video data to overcome the individual errors induced by these modalities. More precisely, the locations derived from video are used to overcome the localization errors inherent in using Wi-Fi signals where precise Wi-Fi MAC IDs are used to locate the same devices across different levels and locations inside a building. Typically, localization in dense environments is a computationally expensive process when done with just video data; hence hard to scale. DenseTrack combines Wi-Fi and video data to improve the accuracy of tracking people that are represented by video objects from non-overlapping video feeds. DenseTrack is a scalable and device-agnostic solution as it does not require any app installation on user smartphones or modifications to the Wi-Fi system. At the core of DenseTrack, is our algorithm — inCremental Association of Independent Variables under Uncertainty (CAIVU). CAIVU is inspired by the multi-armed bandits model and is designed to handle various complex features of practical real-world environments. CAIVU matches the devices reported by an off-the-shelf Wi-Fi system using connectivity information to specific video blobs obtained through a computationally efficient analysis of video data. By exploiting data from heterogeneous sources, DenseTrack offers an effective real-time solution for individual tracking in heavily populated indoor environments. We emphasize that no other previous system targeted nor was validated in such dense indoor environments. We tested DenseTrack extensively using both simulated data, as well as two real-world validations using data from an extremely dense convention center and a moderately dense university environment. Our simulation results show that DenseTrack achieves an average video-to-Wi-Fi matching accuracy of up to 90% in dense environments with a matching latency of 60 s on the simulator. When tested in a real-world extremely dense environment with over 500,000 people moving between different non-overlapping camera feeds, DenseTrack achieved an average match accuracy of 83% to within a 2-people distance with an average latency of 48 s.

在密集的室内环境中跟踪数千人的移动是一个极具挑战性的问题。在本文中,我们提出了一个用于在这种环境中跟踪人的系统- DenseTrack。DenseTrack利用了这些环境中已经存在的传感模式的数据——Wi-Fi(来自企业网络部署)和视频(来自监控摄像头)。我们将Wi-Fi信息与视频数据相结合,以克服这些模式引起的单个错误。更准确地说,从视频中获得的位置用于克服使用Wi-Fi信号固有的定位错误,其中使用精确的Wi-Fi MAC id来定位建筑物内不同楼层和位置的相同设备。通常情况下,在密集环境中,仅使用视频数据进行定位是一个计算成本很高的过程;因此很难扩大规模。DenseTrack结合了Wi-Fi和视频数据,以提高跟踪来自非重叠视频馈送的视频对象所代表的人的准确性。DenseTrack是一种可扩展且与设备无关的解决方案,因为它不需要在用户智能手机上安装任何应用程序或修改Wi-Fi系统。DenseTrack的核心是我们的算法——不确定性下自变量增量关联(CAIVU)。CAIVU的灵感来自多臂强盗模型,旨在处理实际世界环境的各种复杂特征。CAIVU与现成的Wi-Fi系统报告的设备相匹配,使用通过对视频数据进行高效计算分析获得的特定视频斑点的连接信息。通过利用来自不同来源的数据,DenseTrack为人口密集的室内环境中的个人跟踪提供了有效的实时解决方案。我们强调,以前没有其他系统针对如此密集的室内环境,也没有在这种环境中得到验证。我们使用模拟数据对DenseTrack进行了广泛的测试,并使用了来自密度极高的会议中心和中等密度的大学环境的两个真实验证数据。我们的仿真结果表明,DenseTrack在密集环境中实现了高达90%的平均视频到wi - fi匹配精度,模拟器上的匹配延迟为60秒。当在真实世界的极度密集环境中进行测试时,超过500,000人在不同的非重叠摄像机馈电之间移动,DenseTrack在2人距离内实现了83%的平均匹配精度,平均延迟为48秒。
{"title":"Tracking people across ultra populated indoor spaces by matching unreliable Wi-Fi signals with disconnected video feeds","authors":"Hai Truong ,&nbsp;Dheryta Jaisinghani ,&nbsp;Shubham Jain ,&nbsp;Arunesh Sinha ,&nbsp;JeongGil Ko ,&nbsp;Rajesh Balan","doi":"10.1016/j.pmcj.2023.101860","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101860","url":null,"abstract":"<div><p>Tracking in dense indoor environments where several thousands of people move around is an extremely challenging problem. In this paper, we present a system — <em>DenseTrack</em> for tracking people in such environments. <em>DenseTrack</em><span> leverages data from the sensing modalities that are already present in these environments — Wi-Fi (from enterprise network deployments) and Video (from surveillance cameras). We combine Wi-Fi information with video data to overcome the individual errors induced by these modalities. More precisely, the locations derived from video are used to overcome the localization errors<span> inherent in using Wi-Fi signals where precise Wi-Fi MAC IDs are used to locate the same devices across different levels and locations inside a building. Typically, localization<span> in dense environments is a computationally expensive process when done with just video data; hence hard to scale. </span></span></span><em>DenseTrack</em> combines Wi-Fi and video data to improve the accuracy of tracking people that are represented by video objects from non-overlapping video feeds. <em>DenseTrack</em><span> is a scalable and device-agnostic solution as it does not require any app installation on user smartphones or modifications to the Wi-Fi system. At the core of </span><em>DenseTrack</em>, is our algorithm — inCremental Association of Independent Variables under Uncertainty (CAIVU). CAIVU is inspired by the multi-armed bandits model and is designed to handle various complex features of practical real-world environments. CAIVU matches the devices reported by an off-the-shelf Wi-Fi system using connectivity information to specific video blobs obtained through a computationally efficient analysis of video data. By exploiting data from heterogeneous sources, <em>DenseTrack</em> offers an effective real-time solution for individual tracking in heavily populated indoor environments. We emphasize that no other previous system targeted nor was validated in such dense indoor environments. We tested <em>DenseTrack</em> extensively using both simulated data, as well as two real-world validations using data from an extremely dense convention center and a moderately dense university environment. Our simulation results show that <em>DenseTrack</em> achieves an average video-to-Wi-Fi matching accuracy of up to 90% in dense environments with a matching latency of 60 s on the simulator. When tested in a real-world extremely dense environment with over 500,000 people moving between different non-overlapping camera feeds, <em>DenseTrack</em><span> achieved an average match accuracy of 83% to within a 2-people distance with an average latency of 48 s.</span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138474608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid machine learning model for malware analysis in android apps 用于安卓应用程序恶意软件分析的混合机器学习模型
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-11-08 DOI: 10.1016/j.pmcj.2023.101859
Saba Bashir , Farwa Maqbool , Farhan Hassan Khan , Asif Sohail Abid

Android smartphones have been widely adopted across the globe. They have the capability to access private and confidential information resulting in these devices being targeted by malware devisers. The dramatic escalation of assaults build an awareness to create a robust system that detects the occurrence of malicious actions in Android applications. The malware exposure study consists of static and dynamic analysis. This research work proposed a hybrid machine learning model based on static and dynamic analysis which offers efficient classification and detection of Android malware. The proposed novel malware classification technique can process any android application, then extracts its features, and predicts whether the applications under process is malware or benign. The proposed malware detection model can characterizes diverse malware types from Android platform with high positive rate. The proposed approach detects malicious applications in reduced execution time while also improving the security of Android as compared to existing approaches. State-of-the-art machine learning algorithms such as Support Vector Machine, k-Nearest Neighbor, Naïve Bayes, and different ensembles are employed on benign and malign applications to assess the execution of all classifiers on permissions, API calls and intents to identify malware. The proposed technique is evaluated on Drebin, MalGenome and Kaggle dataset, and outcomes indicate that this robust system improved runtime detection of malware with high speed and accuracy. Best accuracy of 100% is achieved on benchmark dataset when compared with state of the art techniques. Furthermore, the proposed approach outperforms state of the art techniques in terms of computational time, true positive rate, false positive rate, accuracy, precision, recall, and f-measure.

安卓智能手机已被全球广泛采用。它们能够访问私人和机密信息,因此成为恶意软件开发者的攻击目标。攻击的急剧升级使人们意识到需要创建一个强大的系统来检测安卓应用程序中是否存在恶意行为。恶意软件暴露研究包括静态和动态分析。这项研究工作提出了一种基于静态和动态分析的混合机器学习模型,可对安卓恶意软件进行高效分类和检测。所提出的新型恶意软件分类技术可以处理任何安卓应用程序,然后提取其特征,并预测所处理的应用程序是恶意软件还是良性应用程序。所提出的恶意软件检测模型能以较高的阳性率识别安卓平台上各种类型的恶意软件。与现有方法相比,所提出的方法能在更短的执行时间内检测出恶意应用程序,同时还能提高安卓系统的安全性。在良性和恶意应用程序上采用了支持向量机、k-近邻、奈夫贝叶斯等最先进的机器学习算法和不同的组合,以评估所有分类器对权限、API 调用和意图的执行情况,从而识别恶意软件。我们在 Drebin、MalGenome 和 Kaggle 数据集上对所提出的技术进行了评估,结果表明这种强大的系统提高了运行时检测恶意软件的速度和准确性。与最先进的技术相比,该系统在基准数据集上的准确率达到了 100%。此外,所提出的方法在计算时间、真阳性率、假阳性率、准确率、精确度、召回率和 f-measure 方面都优于现有技术。
{"title":"Hybrid machine learning model for malware analysis in android apps","authors":"Saba Bashir ,&nbsp;Farwa Maqbool ,&nbsp;Farhan Hassan Khan ,&nbsp;Asif Sohail Abid","doi":"10.1016/j.pmcj.2023.101859","DOIUrl":"10.1016/j.pmcj.2023.101859","url":null,"abstract":"<div><p><span>Android<span><span> smartphones have been widely adopted across the globe. They have the capability to access private and confidential information resulting in these devices being targeted by malware devisers. The dramatic escalation of assaults build an awareness to create a robust system that detects the occurrence of malicious actions in </span>Android applications. The malware exposure study consists of static and dynamic analysis. This research work proposed a hybrid </span></span>machine learning<span><span><span> model based on static and dynamic analysis which offers efficient classification and detection of Android malware. The proposed novel malware classification technique can process any android application, then extracts its features, and predicts whether the applications under process is malware or benign. The proposed malware detection model can characterizes diverse malware types from Android platform with high positive rate. The proposed approach detects </span>malicious applications<span><span> in reduced execution time while also improving the security of Android as compared to existing approaches. State-of-the-art machine learning algorithms such as </span>Support Vector Machine, k-Nearest Neighbor, Naïve Bayes, and different ensembles are employed on benign and malign applications to assess the execution of all classifiers on permissions, API calls and intents to identify malware. The proposed technique is evaluated on Drebin, MalGenome and Kaggle dataset, and outcomes indicate that this robust system improved runtime detection of malware with high speed and accuracy. Best accuracy of 100% is achieved on benchmark dataset when compared with </span></span>state of the art techniques. Furthermore, the proposed approach outperforms state of the art techniques in terms of computational time, true positive rate, false positive rate, accuracy, precision, recall, and f-measure.</span></p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135515228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition DA-HAR:用于环境无关WiFi人类活动识别的双对抗网络
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-10-27 DOI: 10.1016/j.pmcj.2023.101850
Long Sheng , Yue Chen , Shuli Ning , Shengpeng Wang , Bin Lian , Zhongcheng Wei

As the cornerstone of the development of emerging integrated sensing and communication, human activity recognition technology based on WiFi signals has been extensively studied. However, the existing activity sensing models will suffer serious performance degradation when applied to new scenarios due to the influence of environmental dynamics. To address this issue, we present an environment-independent activity recognition model named DA-HAR, which utilizes dual adversarial network. The framework exploits adversarial training among source domain classifiers and source–target domain discriminators to extract environment-independent activity features. To improve the performance of the model, a pseudo-label prediction based approach is introduced to assign labels to the target domain samples that closely resemble the source domain samples, thus mitigating the distribution deviation of activity features between source domain and target domain. Experimental results show that our proposed model has better cross-domain recognition performance compared to state-of-the-art recognition systems, especially when the distribution of activity features in the source domain and the target domain is significantly different, the accuracy is improved by 6.96% 11.22%.

作为新兴传感与通信集成发展的基石,基于WiFi信号的人体活动识别技术得到了广泛的研究。然而,由于环境动力学的影响,现有的活动感知模型在应用于新场景时会出现严重的性能下降。为了解决这一问题,我们提出了一种基于双对抗网络的环境无关的活动识别模型DA-HAR。该框架利用源域分类器和源-目标域鉴别器之间的对抗训练来提取与环境无关的活动特征。为了提高模型的性能,引入了一种基于伪标签预测的方法,为与源域样本相似的目标域样本分配标签,从而减轻源域和目标域之间活动特征的分布偏差。实验结果表明,与现有的识别系统相比,我们提出的模型具有更好的跨域识别性能,特别是当源域和目标域的活动特征分布显著不同时,准确率提高了6.96% ~ 11.22%。
{"title":"DA-HAR: Dual adversarial network for environment-independent WiFi human activity recognition","authors":"Long Sheng ,&nbsp;Yue Chen ,&nbsp;Shuli Ning ,&nbsp;Shengpeng Wang ,&nbsp;Bin Lian ,&nbsp;Zhongcheng Wei","doi":"10.1016/j.pmcj.2023.101850","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101850","url":null,"abstract":"<div><p><span><span>As the cornerstone of the development of emerging integrated sensing and communication, human activity recognition technology based on WiFi signals has been extensively studied. However, the existing activity sensing models will suffer serious </span>performance degradation<span><span> when applied to new scenarios due to the influence of environmental dynamics. To address this issue, we present an environment-independent activity recognition model named DA-HAR, which utilizes dual adversarial network. The framework exploits adversarial training among source domain classifiers and source–target domain </span>discriminators to extract environment-independent activity features. To improve the performance of the model, a pseudo-label prediction based approach is introduced to assign labels to the target domain samples that closely resemble the source domain samples, thus mitigating the distribution deviation of activity features between source domain and target domain. Experimental results show that our proposed model has better cross-domain recognition performance compared to state-of-the-art recognition systems, especially when the distribution of activity features in the source domain and the target domain is significantly different, the accuracy is improved by 6.96% </span></span><span><math><mo>∼</mo></math></span> 11.22%.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92014450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MRIM: Lightweight saliency-based mixed-resolution imaging for low-power pervasive vision mrm:用于低功耗普适视觉的轻量级显著性混合分辨率成像
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-10-27 DOI: 10.1016/j.pmcj.2023.101858
Ji-Yan Wu, Vithurson Subasharan, Tuan Tran, Kasun Gamlath, Archan Misra

While many pervasive computing applications increasingly utilize real-time context extracted from a vision sensing infrastructure, the high energy overhead of DNN-based vision sensing pipelines remains a challenge for sustainable in-the-wild deployment. One common approach to reducing such energy overheads is the capture and transmission of lower-resolution images to an edge node (where the DNN inferencing task is executed), but this results in an accuracy-vs-energy tradeoff, as the DNN inference accuracy typically degrades with a drop in resolution. In this work, we introduce MRIM, a simple but effective framework to tackle this tradeoff. Under MRIM, the vision sensor platform first executes a lightweight preprocessing step to determine the saliency of different sub-regions within a single captured image frame, and then performs a saliency-aware non-uniform downscaling of individual sub-regions to produce a “mixed-resolution” image. We describe two novel low-complexity algorithms that the sensor platform can use to quickly compute suitable resolution choices for different regions under different energy/accuracy constraints. Experimental studies, involving object detection tasks evaluated traces from two benchmark urban monitoring datasets as well as a prototype Raspberry Pi-based MRIM implementation, demonstrate MRIM’s efficacy: even with an unoptimized embedded platform, MRIM can provide system energy conservation of 35+% (80% in high accuracy regimes) or increase task accuracy by 8+%, over conventional baselines of uniform resolution downscaling or image encoding, while supporting high throughput. On a low power ESP32 vision board, MRIM continues to provide 60+% energy savings over uniform downscaling while maintaining high detection accuracy. We further introduce an automated data-driven technique for determining a close-to-optimal number of MRIM sub-regions (for differential resolution adjustment), across different deployment conditions. We also show the generalized use of MRIM by considering an additional license plate recognition (LPR) task: while alternative approaches suffer 35%–40% loss in accuracy, MRIM suffers only a modest recognition loss of 10% even when the transmission data is reduced by over 50%.

虽然许多普然计算应用越来越多地利用从视觉传感基础设施中提取的实时上下文,但基于dnn的视觉传感管道的高能量开销仍然是可持续野外部署的一个挑战。减少这种能量开销的一种常见方法是捕获和传输低分辨率图像到边缘节点(DNN推理任务执行的地方),但这会导致精度与能量的权衡,因为DNN推理精度通常会随着分辨率的下降而降低。在这项工作中,我们介绍了一个简单但有效的框架,以解决这种权衡。在mrm下,视觉传感器平台首先执行轻量级预处理步骤,以确定单个捕获图像帧内不同子区域的显着性,然后对单个子区域进行显着性感知的非均匀降尺度,以产生“混合分辨率”图像。我们描述了两种新颖的低复杂度算法,传感器平台可以使用它们在不同能量/精度约束下快速计算不同区域的合适分辨率选择。通过对两个基准城市监测数据集和基于树莓派的原型MRIM实现的目标检测任务进行评估的实验研究,证明了MRIM的有效性:即使使用未优化的嵌入式平台,与统一分辨率降尺度或图像编码的传统基线相比,MRIM也可以提供35%以上的系统节能(在高精度情况下为80%)或将任务精度提高8%以上,同时支持高吞吐量。在低功耗ESP32视觉板上,通过均匀缩小,mrm继续提供60%以上的节能,同时保持高检测精度。我们进一步介绍了一种自动化数据驱动技术,用于在不同部署条件下确定接近最优的mrm子区域数量(用于差分分辨率调整)。我们还通过考虑额外的车牌识别(LPR)任务展示了MRIM的广泛使用:尽管其他方法的准确性会损失35%-40%,但即使传输数据减少50%以上,MRIM也只会遭受10%的适度识别损失。
{"title":"MRIM: Lightweight saliency-based mixed-resolution imaging for low-power pervasive vision","authors":"Ji-Yan Wu,&nbsp;Vithurson Subasharan,&nbsp;Tuan Tran,&nbsp;Kasun Gamlath,&nbsp;Archan Misra","doi":"10.1016/j.pmcj.2023.101858","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101858","url":null,"abstract":"<div><p><span><span>While many pervasive computing applications increasingly utilize real-time context extracted from a vision sensing infrastructure, the high energy overhead of DNN-based vision sensing pipelines remains a challenge for sustainable in-the-wild deployment. One common approach to reducing such energy overheads is the capture and transmission of lower-resolution images to an edge node (where the </span>DNN inferencing task is executed), but this results in an accuracy-vs-energy tradeoff, as the DNN inference accuracy typically degrades with a drop in resolution. In this work, we introduce </span><em>MRIM</em>, a simple but effective framework to tackle this tradeoff. Under <em>MRIM</em><span>, the vision sensor platform first executes a lightweight preprocessing step to determine the saliency of different sub-regions within a single captured image frame, and then performs a saliency-aware non-uniform downscaling of individual sub-regions to produce a “mixed-resolution” image. We describe two novel low-complexity algorithms that the sensor platform can use to quickly compute suitable resolution choices for different regions under different energy/accuracy constraints. Experimental studies, involving object detection tasks evaluated traces from two benchmark urban monitoring datasets as well as a prototype Raspberry Pi-based </span><em>MRIM</em> implementation, demonstrate <em>MRIM’s</em> efficacy: even with an unoptimized embedded platform, <em>MRIM</em><span> can provide system energy conservation of </span><span><math><mrow><mn>35</mn><mo>+</mo><mtext>%</mtext></mrow></math></span> (<span><math><mo>∼</mo></math></span>80% in high accuracy regimes) or increase task accuracy by <span><math><mrow><mn>8</mn><mo>+</mo><mtext>%</mtext></mrow></math></span><span>, over conventional baselines of uniform resolution downscaling or image encoding, while supporting high throughput. On a low power ESP32 vision board, </span><em>MRIM</em><span> continues to provide 60+% energy savings over uniform downscaling while maintaining high detection accuracy. We further introduce an automated data-driven technique for determining a close-to-optimal number of </span><em>MRIM</em> sub-regions (for differential resolution adjustment), across different deployment conditions. We also show the generalized use of <em>MRIM</em><span> by considering an additional license plate recognition (LPR) task: while alternative approaches suffer 35%–40% loss in accuracy, </span><em>MRIM</em> suffers only a modest recognition loss of <span><math><mo>∼</mo></math></span>10% even when the transmission data is reduced by over 50%.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92108576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient concept drift handling for batch android malware detection models 有效的概念漂移处理批android恶意软件检测模型
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-10-20 DOI: 10.1016/j.pmcj.2023.101849
Borja Molina-Coronado , Usue Mori , Alexander Mendiburu , Jose Miguel-Alonso

The rapidly evolving nature of Android apps poses a significant challenge to static batch machine learning algorithms employed in malware detection systems, as they quickly become obsolete. Despite this challenge, the existing literature pays limited attention to addressing this issue, with many advanced Android malware detection approaches, such as Drebin, DroidDet and MaMaDroid, relying on static models. In this work, we show how retraining techniques are able to maintain detector capabilities over time. Particularly, we analyze the effect of two aspects in the efficiency and performance of the detectors: (1) the frequency with which the models are retrained, and (2) the data used for retraining. In the first experiment, we compare periodic retraining with a more advanced concept drift detection method that triggers retraining only when necessary. In the second experiment, we analyze sampling methods to reduce the amount of data used to retrain models. Specifically, we compare fixed sized windows of recent data and state-of-the-art active learning methods that select those apps that help keep the training dataset small but diverse. Our experiments show that concept drift detection and sample selection mechanisms result in very efficient retraining strategies which can be successfully used to maintain the performance of the static Android malware state-of-the-art detectors in changing environments.

安卓应用程序的快速发展对恶意软件检测系统中使用的静态批处理机器学习算法构成了重大挑战,因为它们很快就会过时。尽管存在这一挑战,但现有文献对解决这一问题的关注有限,许多先进的安卓恶意软件检测方法,如Drebin、DroidDet和MaMaDroid,都依赖于静态模型。在这项工作中,我们展示了再培训技术如何能够随着时间的推移保持检测器的能力。特别地,我们分析了两个方面对检测器的效率和性能的影响:(1)对模型进行再训练的频率,以及(2)用于再训练的数据。在第一个实验中,我们将周期性再训练与更先进的概念漂移检测方法进行了比较,该方法仅在必要时触发再训练。在第二个实验中,我们分析了采样方法,以减少用于重新训练模型的数据量。具体来说,我们比较了固定大小的最近数据窗口和最先进的主动学习方法,这些方法选择了有助于保持训练数据集小而多样的应用程序。我们的实验表明,概念漂移检测和样本选择机制产生了非常有效的再训练策略,可以成功地用于在不断变化的环境中保持静态安卓恶意软件最先进检测器的性能。
{"title":"Efficient concept drift handling for batch android malware detection models","authors":"Borja Molina-Coronado ,&nbsp;Usue Mori ,&nbsp;Alexander Mendiburu ,&nbsp;Jose Miguel-Alonso","doi":"10.1016/j.pmcj.2023.101849","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101849","url":null,"abstract":"<div><p>The rapidly evolving nature of Android apps poses a significant challenge to static batch machine learning algorithms employed in malware detection systems, as they quickly become obsolete. Despite this challenge, the existing literature pays limited attention to addressing this issue, with many advanced Android malware detection approaches, such as Drebin, DroidDet and MaMaDroid, relying on static models. In this work, we show how retraining techniques are able to maintain detector capabilities over time. Particularly, we analyze the effect of two aspects in the efficiency and performance of the detectors: (1) the frequency with which the models are retrained, and (2) the data used for retraining. In the first experiment, we compare periodic retraining with a more advanced concept drift detection method that triggers retraining only when necessary. In the second experiment, we analyze sampling methods to reduce the amount of data used to retrain models. Specifically, we compare fixed sized windows of recent data and state-of-the-art active learning methods that select those apps that help keep the training dataset small but diverse. Our experiments show that concept drift detection and sample selection mechanisms result in very efficient retraining strategies which can be successfully used to maintain the performance of the static Android malware state-of-the-art detectors in changing environments.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49767195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight accurate trigger to reduce power consumption in sensor-based continuous human activity recognition 轻量化的精确触发器,以减少功耗传感器为基础的连续人体活动识别
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-10-05 DOI: 10.1016/j.pmcj.2023.101848
Emanuele Lattanzi, Lorenzo Calisti, Paolo Capellacci

Wearable devices have become increasingly popular in recent years, and they offer a great opportunity for sensor-based continuous human activity recognition in real-world scenarios. However, one of the major challenges is their limited battery life. In this study, we propose an energy-aware human activity recognition framework for wearable devices based on a lightweight accurate trigger. The trigger acts as a binary classifier capable of recognizing, with maximum accuracy, the presence or absence of one of the interesting activities in the real-time input signal and it is responsible for starting the energy-intensive classification procedure only when needed. The measurement results conducted on a real wearable device show that the proposed approach can reduce energy consumption by up to 95% in realistic case studies, with a cost of performance deterioration of at most 1% or 2% compared to the traditional energy-intensive classification strategy.

近年来,可穿戴设备越来越受欢迎,它们为在现实世界场景中基于传感器的连续人类活动识别提供了巨大的机会。然而,其中一个主要挑战是它们的电池寿命有限。在这项研究中,我们提出了一个基于轻量级精确触发器的可穿戴设备能量感知人类活动识别框架。触发器充当二进制分类器,能够以最大准确度识别实时输入信号中感兴趣的活动之一的存在或不存在,并且仅在需要时才负责启动能量密集型分类过程。在实际可穿戴设备上进行的测量结果表明,在实际案例研究中,所提出的方法可以将能耗降低95%,与传统的能源密集型分类策略相比,性能恶化的成本最多为1%或2%。
{"title":"Lightweight accurate trigger to reduce power consumption in sensor-based continuous human activity recognition","authors":"Emanuele Lattanzi,&nbsp;Lorenzo Calisti,&nbsp;Paolo Capellacci","doi":"10.1016/j.pmcj.2023.101848","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101848","url":null,"abstract":"<div><p>Wearable devices have become increasingly popular in recent years, and they offer a great opportunity for sensor-based continuous human activity recognition in real-world scenarios. However, one of the major challenges is their limited battery life. In this study, we propose an energy-aware human activity recognition framework for wearable devices based on a lightweight accurate trigger. The trigger acts as a binary classifier capable of recognizing, with maximum accuracy, the presence or absence of one of the interesting activities in the real-time input signal and it is responsible for starting the energy-intensive classification procedure only when needed. The measurement results conducted on a real wearable device show that the proposed approach can reduce energy consumption by up to 95% in realistic case studies, with a cost of performance deterioration of at most 1% or 2% compared to the traditional energy-intensive classification strategy.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49764728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The geodesic mutual visibility problem: Oblivious robots on grids and trees 测地线相互可见性问题:网格和树木上的遗忘机器人
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-10-01 DOI: 10.1016/j.pmcj.2023.101842
Serafino Cicerone , Alessia Di Fonso , Gabriele Di Stefano , Alfredo Navarra

The Mutual Visibility is a well-known problem in the context of mobile robots. For a set of n robots disposed in the Euclidean plane, it asks for moving the robots without collisions so as to achieve a placement ensuring that no three robots are collinear. For robots moving on graphs, we consider the Geodesic Mutual Visibility(GMV) problem. Robots move along the edges of the graph, without collisions, so as to occupy some vertices that guarantee they become pairwise geodesic mutually visible. This means that there is a shortest path (i.e., a “geodesic”) between each pair of robots along which no other robots reside. We study this problem in the context of trees and (finite or infinite) square grids, for robots operating under the standard Look–Compute–Move model. In both scenarios, we provide resolution algorithms along with formal correctness proofs, highlighting the most relevant peculiarities arising within the different contexts, while optimizing the time complexity.

在移动机器人的背景下,相互可见性是一个众所周知的问题。对于布置在欧几里得平面中的一组n个机器人,它要求在没有碰撞的情况下移动机器人,以实现确保没有三个机器人共线的放置。对于在图上移动的机器人,我们考虑大地互视(GMV)问题。机器人沿着图的边缘移动,不会发生碰撞,从而占据一些顶点,从而确保它们成为成对的测地线,相互可见。这意味着每对机器人之间都有一条最短的路径(即“测地线”),而没有其他机器人沿着这条路径驻留。我们在树和(有限或无限)正方形网格的背景下研究了这个问题,用于在标准的Look–Compute–Move模型下操作的机器人。在这两种情况下,我们都提供了解析算法和形式正确性证明,突出了不同上下文中出现的最相关的特性,同时优化了时间复杂性。
{"title":"The geodesic mutual visibility problem: Oblivious robots on grids and trees","authors":"Serafino Cicerone ,&nbsp;Alessia Di Fonso ,&nbsp;Gabriele Di Stefano ,&nbsp;Alfredo Navarra","doi":"10.1016/j.pmcj.2023.101842","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101842","url":null,"abstract":"<div><p>The <span>Mutual Visibility</span> is a well-known problem in the context of mobile robots. For a set of <span><math><mi>n</mi></math></span> robots disposed in the Euclidean plane, it asks for moving the robots without collisions so as to achieve a placement ensuring that no three robots are collinear. For robots moving on graphs, we consider the <span>Geodesic Mutual Visibility</span>\u0000(<span><math><mi>GMV</mi></math></span>) problem. Robots move along the edges of the graph, without collisions, so as to occupy some vertices that guarantee they become pairwise geodesic mutually visible. This means that there is a shortest path (i.e., a “geodesic”) between each pair of robots along which no other robots reside. We study this problem in the context of trees and (finite or infinite) square grids, for robots operating under the standard Look–Compute–Move model. In both scenarios, we provide resolution algorithms along with formal correctness proofs, highlighting the most relevant peculiarities arising within the different contexts, while optimizing the time complexity.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49746298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy–Aware security protocol for IoT devices 物联网设备的能源感知安全协议
IF 4.3 3区 计算机科学 Q1 Computer Science Pub Date : 2023-10-01 DOI: 10.1016/j.pmcj.2023.101847
Malak Barari, Ramzi Saifan

Internet of Things (IoT) has permeated various aspects of modern life, from smart homes to factories and even gardens. In the coming years, number of IoT devices is expected to surpass that of computers, laptops, mobile phones, and tablets. However, many of these devices are small and operate on batteries, making energy efficiency a significant challenge. This challenge affects all aspects of IoT, including security. To address this issue, we present an adaptive security approach in this paper. Adaptive security involves adjusting the security level based on the level of threats and data context, rather than always assuming the worst-case scenario. This approach reduces energy consumption and is implemented in three parts: 1) Adapting the length of RSA public and private keys, where longer keys provide more security but consume more power. 2) Adapting the trust level between nodes based on the history of the transmitting node, where the receiving node decides whether to verify the correctness of the received messages or not. 3) Utilizing TrustChain, which is transactional verification method inspired by the blockchain concept.

We evaluated the performance of our proposed model through exhaustive simulation scenarios and experiments. Our approach outperforms state-of-the-art methods, with the variable key length approach reducing energy consumption by 50%, the trust level approach reducing energy consumption by approximately 50%, and the TrustChain approach reducing energy consumption to 0.771 J, while the blockchain-based method consumed 2.955 J to verify transactions.

物联网已经渗透到现代生活的各个方面,从智能家居到工厂甚至花园。未来几年,物联网设备的数量预计将超过电脑、笔记本电脑、手机和平板电脑。然而,这些设备中的许多都很小,使用电池运行,这使得能源效率成为一个重大挑战。这一挑战影响到物联网的各个方面,包括安全。为了解决这个问题,我们在本文中提出了一种自适应安全方法。自适应安全包括根据威胁级别和数据上下文调整安全级别,而不是总是假设最坏的情况。这种方法减少了能源消耗,分三部分实现:1)调整RSA公钥和私钥的长度,其中较长的密钥提供了更多的安全性,但消耗了更多的电力。2) 基于发送节点的历史来调整节点之间的信任级别,其中接收节点决定是否验证接收到的消息的正确性。3) 利用TrustChain,这是一种受区块链概念启发的交易验证方法。我们通过详尽的模拟场景和实验评估了我们提出的模型的性能。我们的方法优于最先进的方法,可变密钥长度方法将能耗降低了50%,信任级别方法将能耗减少了约50%,TrustChain方法将能耗降至0.771 J,而基于区块链的方法验证交易消耗了2.955 J。
{"title":"Energy–Aware security protocol for IoT devices","authors":"Malak Barari,&nbsp;Ramzi Saifan","doi":"10.1016/j.pmcj.2023.101847","DOIUrl":"https://doi.org/10.1016/j.pmcj.2023.101847","url":null,"abstract":"<div><p><span>Internet of Things (IoT) has permeated various aspects of modern life, from smart homes to factories and even gardens. In the coming years, number of IoT devices is expected to surpass that of computers, laptops, mobile phones, and tablets. However, many of these devices are small and operate on batteries, making energy efficiency a significant challenge. This challenge affects all aspects of IoT, including security. To address this issue, we present an adaptive security approach in this paper. Adaptive security involves adjusting the </span>security level<span> based on the level of threats and data context, rather than always assuming the worst-case scenario. This approach reduces energy consumption and is implemented in three parts: 1) Adapting the length of RSA public and private keys, where longer keys provide more security but consume more power. 2) Adapting the trust level between nodes based on the history of the transmitting node, where the receiving node decides whether to verify the correctness of the received messages or not. 3) Utilizing TrustChain, which is transactional verification method inspired<span> by the blockchain concept.</span></span></p><p>We evaluated the performance of our proposed model through exhaustive simulation scenarios and experiments. Our approach outperforms state-of-the-art methods, with the variable key length approach reducing energy consumption by 50%, the trust level approach reducing energy consumption by approximately 50%, and the TrustChain approach reducing energy consumption to 0.771 J, while the blockchain-based method consumed 2.955 J to verify transactions.</p></div>","PeriodicalId":49005,"journal":{"name":"Pervasive and Mobile Computing","volume":null,"pages":null},"PeriodicalIF":4.3,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49747530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Pervasive and Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1