首页 > 最新文献

Simulation Modelling Practice and Theory最新文献

英文 中文
Mesoscopic V2X simulation framework to enhance simulation performance 介观 V2X 仿真框架提升仿真性能
IF 3.5 2区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-07-30 DOI: 10.1016/j.simpat.2024.103003
Tamás Ormándi, Balázs Varga

The rapid evolution of vehicular communication has led to numerous new algorithms and applications based on this technology. Neglecting issues arising from wireless communication, such as the loss of information and delays, can result in problems such as reduced performance or compromised safety. However, while simulating V2X demands significant computational resources, it proves unsuitable for complex testing setups, including mixed-reality testing. This paper enhances V2X simulation by relying on an ecosystem based on SUMO, OMNeT++, Veins, and INET simulation tools. The proposed novel method introduces mesoscopic simulation in Vehicular Ad-hoc Networks to increase simulation performance to a level where real-time behavior is achievable. Meanwhile, it can also be beneficial in the acceleration of regular simulations. The presented solution introduces Meso nodes that are capable of aggregating communication across an entire traffic area, facilitated by a neural network function approximator. Results showed substantial performance gain while simulation accuracy was preserved.

车辆通信的快速发展催生了大量基于该技术的新算法和应用。忽视无线通信所产生的问题,如信息丢失和延迟,可能会导致性能降低或安全受损等问题。然而,模拟 V2X 需要大量的计算资源,不适合复杂的测试设置,包括混合现实测试。本文依靠基于 SUMO、OMNeT++、Veins 和 INET 仿真工具的生态系统来增强 V2X 仿真。所提出的新方法在车载 Ad-hoc 网络中引入了介观仿真,将仿真性能提高到可实现实时行为的水平。同时,这种方法也有利于加速常规仿真。所提出的解决方案引入了中子节点,这些节点能够通过神经网络函数近似器在整个交通区域内汇聚通信。结果表明,在保持仿真精度的同时,性能也得到了大幅提升。
{"title":"Mesoscopic V2X simulation framework to enhance simulation performance","authors":"Tamás Ormándi,&nbsp;Balázs Varga","doi":"10.1016/j.simpat.2024.103003","DOIUrl":"10.1016/j.simpat.2024.103003","url":null,"abstract":"<div><p>The rapid evolution of vehicular communication has led to numerous new algorithms and applications based on this technology. Neglecting issues arising from wireless communication, such as the loss of information and delays, can result in problems such as reduced performance or compromised safety. However, while simulating V2X demands significant computational resources, it proves unsuitable for complex testing setups, including mixed-reality testing. This paper enhances V2X simulation by relying on an ecosystem based on SUMO, OMNeT++, Veins, and INET simulation tools. The proposed novel method introduces mesoscopic simulation in Vehicular Ad-hoc Networks to increase simulation performance to a level where real-time behavior is achievable. Meanwhile, it can also be beneficial in the acceleration of regular simulations. The presented solution introduces Meso nodes that are capable of aggregating communication across an entire traffic area, facilitated by a neural network function approximator. Results showed substantial performance gain while simulation accuracy was preserved.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":"136 ","pages":"Article 103003"},"PeriodicalIF":3.5,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1569190X24001175/pdfft?md5=42364717b342c8e9528e19a5ec83b1f9&pid=1-s2.0-S1569190X24001175-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141933865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agent-based simulation of non-urgent egress from mass events in open public spaces 基于代理的开放式公共场所群体事件非紧急逃生模拟
IF 3.5 2区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-07-22 DOI: 10.1016/j.simpat.2024.103002
Duarte Sampaio de Almeida , Fernando Brito e Abreu , Inês Boavida-Portugal

Public mass events require thorough planning on allocating resources such as paramedics, police officers, urban cleaning teams, and their equipment (ambulances, patrol cars, garbage collection trucks, and other urban cleaning vehicles). Testing different scenarios of event venue layout and crowd behavior at the end of an event might be useful to plan the event and said resource allocation.

Our main objective is to model the non-urgent egress of participants at the end of an event, with possible applications for event management. That is when some resources are released (police and paramedics) and others are requested (urban cleaning teams).

Using the agent-based GAMA platform, we implemented a spatially explicit simulation model upon an extension of the Social Force Model that considers group behavior, and a novel implementation of the “social retention” phenomenon, to simulate non-urgent egress from public space mass gathering events. Focus groups with architecture, geography, and urban ergonomics experts were conducted for face validation and improvement of the model.

We present the outcome of a series of simulations of a scenario mimicking a real-life music event that took place in a square in downtown Lisbon, Portugal. Cell phone data captured during the event was used to calibrate the model. We analyzed model performance when the number of pedestrian agents increases, to assess the feasibility of using our approach in participatory discussions with stakeholders responsible for resources management.

On average, the egress evolution obtained in the simulations fit well with the evolution of cell phone counts captured during the event. The behavior of groups of agents evidenced real-life phenomena, such as the persistence of group cohesion and repulsion interactions (both with architectural obstacles and other agents).

Model performance degradation with the increasing number of agents may hamper the usage of this model/platform for participatory meetings, due to the incurred delay in obtaining results. To mitigate this problem, we plan to explore parallelization strategies for agent-based simulation, such as using GPUs.

公共群体活动需要对救护人员、警察、城市清洁队及其设备(救护车、巡逻车、垃圾收集车和其他城市清洁车辆)等资源的分配进行全面规划。我们的主要目标是模拟活动结束时参与者的非紧急疏散情况,并将其应用于活动管理。利用基于代理的 GAMA 平台,我们在考虑群体行为的社会力量模型的扩展基础上,实施了一个空间明确的模拟模型,并对 "社会滞留 "现象进行了新颖的实施,以模拟公共空间群体聚集活动的非紧急疏散。我们与建筑、地理和城市人体工程学专家进行了焦点小组讨论,以对模型进行验证和改进。我们展示了在葡萄牙里斯本市中心一个广场上模拟真实音乐活动场景的一系列模拟结果。活动期间捕获的手机数据被用于校准模型。我们分析了行人代理数量增加时的模型性能,以评估在与负责资源管理的利益相关者进行参与式讨论时使用我们的方法的可行性。代理群体的行为证明了现实生活中的一些现象,如群体凝聚力的持续性和排斥性互动(包括与建筑障碍物和其他代理的互动)。随着代理数量的增加,模型性能下降,这可能会妨碍该模型/平台在参与式会议中的应用,因为这会导致获取结果的延迟。为了缓解这一问题,我们计划探索基于代理的仿真的并行化策略,例如使用 GPU。
{"title":"Agent-based simulation of non-urgent egress from mass events in open public spaces","authors":"Duarte Sampaio de Almeida ,&nbsp;Fernando Brito e Abreu ,&nbsp;Inês Boavida-Portugal","doi":"10.1016/j.simpat.2024.103002","DOIUrl":"10.1016/j.simpat.2024.103002","url":null,"abstract":"<div><p>Public mass events require thorough planning on allocating resources such as paramedics, police officers, urban cleaning teams, and their equipment (ambulances, patrol cars, garbage collection trucks, and other urban cleaning vehicles). Testing different scenarios of event venue layout and crowd behavior at the end of an event might be useful to plan the event and said resource allocation.</p><p>Our main objective is to model the non-urgent egress of participants at the end of an event, with possible applications for event management. That is when some resources are released (police and paramedics) and others are requested (urban cleaning teams).</p><p>Using the agent-based GAMA platform, we implemented a spatially explicit simulation model upon an extension of the Social Force Model that considers group behavior, and a novel implementation of the “social retention” phenomenon, to simulate non-urgent egress from public space mass gathering events. Focus groups with architecture, geography, and urban ergonomics experts were conducted for face validation and improvement of the model.</p><p>We present the outcome of a series of simulations of a scenario mimicking a real-life music event that took place in a square in downtown Lisbon, Portugal. Cell phone data captured during the event was used to calibrate the model. We analyzed model performance when the number of pedestrian agents increases, to assess the feasibility of using our approach in participatory discussions with stakeholders responsible for resources management.</p><p>On average, the egress evolution obtained in the simulations fit well with the evolution of cell phone counts captured during the event. The behavior of groups of agents evidenced real-life phenomena, such as the persistence of group cohesion and repulsion interactions (both with architectural obstacles and other agents).</p><p>Model performance degradation with the increasing number of agents may hamper the usage of this model/platform for participatory meetings, due to the incurred delay in obtaining results. To mitigate this problem, we plan to explore parallelization strategies for agent-based simulation, such as using GPUs.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":"136 ","pages":"Article 103002"},"PeriodicalIF":3.5,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141842909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint optimization of offloading strategy and resource allocation for multi-user in dynamic vehicular edge computing systems 动态车载边缘计算系统中多用户卸载策略和资源分配的联合优化
IF 3.5 2区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-07-20 DOI: 10.1016/j.simpat.2024.103001
Zhuocheng Du , Yuanzhi Ni , Hongfeng Tao , Mingfeng Yin

Internet of Vehicles (IoV) relies heavily on its computing capability to facilitate various vehicular applications. Since the cloud computing or mobile edge computing (MEC) only cannot satisfy the latency requirement due to the limitation of the resource coverage, the cloud–edge-end cooperative computing has become an emerging paradigm. A comprehensive IoV architecture is considered and a joint optimization problem is formulated to minimize the system function value. To optimize the resource allocation and the task offloading strategy, the simulated spring system algorithm (SSSA) is designed where the initial problem is decoupled into two sub-problems with priority. The first one is to allocate computing resources based on KKT conditions, thus the individual optimal solution is achieved. The second one is solved based on the idea of simulated spring system such that the task offloading strategy is obtained. Two sub-problems iterate mutually to update each other until finishing the binary tree traversal. Thus, the proposed solution adapts to various conditions and the computational complexity is also reduced compared with traditional methods. Simulation verifies that the proposed algorithm reduces the maximum system function value by about 31% compared with the benchmark methods and performs efficiently in various road conditions.

车联网(IoV)在很大程度上依赖其计算能力来促进各种车辆应用。由于资源覆盖范围的限制,仅靠云计算或移动边缘计算(MEC)无法满足延迟要求,因此云-边-端协同计算已成为一种新兴模式。本文考虑了一种全面的 IoV 架构,并提出了一个联合优化问题,以最小化系统函数值。为了优化资源分配和任务卸载策略,设计了模拟弹簧系统算法(SSSA),将初始问题解耦为两个具有优先级的子问题。第一个子问题是根据 KKT 条件分配计算资源,从而实现单个最优解。第二个子问题基于模拟弹簧系统的思想进行求解,从而获得任务卸载策略。两个子问题相互迭代更新,直到完成二叉树遍历。因此,与传统方法相比,所提出的解决方案能适应各种条件,计算复杂度也有所降低。模拟验证表明,与基准方法相比,所提出的算法将最大系统函数值降低了约 31%,并且在各种路况下都能高效执行。
{"title":"Joint optimization of offloading strategy and resource allocation for multi-user in dynamic vehicular edge computing systems","authors":"Zhuocheng Du ,&nbsp;Yuanzhi Ni ,&nbsp;Hongfeng Tao ,&nbsp;Mingfeng Yin","doi":"10.1016/j.simpat.2024.103001","DOIUrl":"10.1016/j.simpat.2024.103001","url":null,"abstract":"<div><p>Internet of Vehicles (IoV) relies heavily on its computing capability to facilitate various vehicular applications. Since the cloud computing or mobile edge computing (MEC) only cannot satisfy the latency requirement due to the limitation of the resource coverage, the cloud–edge-end cooperative computing has become an emerging paradigm. A comprehensive IoV architecture is considered and a joint optimization problem is formulated to minimize the system function value. To optimize the resource allocation and the task offloading strategy, the simulated spring system algorithm (SSSA) is designed where the initial problem is decoupled into two sub-problems with priority. The first one is to allocate computing resources based on KKT conditions, thus the individual optimal solution is achieved. The second one is solved based on the idea of simulated spring system such that the task offloading strategy is obtained. Two sub-problems iterate mutually to update each other until finishing the binary tree traversal. Thus, the proposed solution adapts to various conditions and the computational complexity is also reduced compared with traditional methods. Simulation verifies that the proposed algorithm reduces the maximum system function value by about 31% compared with the benchmark methods and performs efficiently in various road conditions.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":"136 ","pages":"Article 103001"},"PeriodicalIF":3.5,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141845450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning-based detection of the man-in-the-middle attack in the physical layer of 5G networks 基于机器学习的 5G 网络物理层中间人攻击检测
IF 3.5 2区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-07-15 DOI: 10.1016/j.simpat.2024.102998
Abdullah Qasem , Ashraf Tahat

Fifth generation communication networks (5G) has received a great deal of attention from academia and industry alike, which will enable a wide variety of vertical applications by connecting heterogeneous devices and machines. Assessing availability and reliability in many circumstances and environments is critical. Researchers have recently focused on investigating and analyzing new multimedia networks with artificial intelligence (AI) technologies to achieve higher data rates and secure communication traffic between parties. User information privacy and security are of vital importance and of growing concerns that present evolving challenges to overcome in preventing attacks. Man-in-the-middle (MITM) attack is considered one of the most common attacks, where an attacker can impersonate one of the parties in a communication system to steal user data or forge the malicious data. Due to the limitation of using conventional cryptographic techniques for mobile networks and similar systems, new methods have been introduced to validate and authenticate transmitted signals dynamically, depending on the physical layer. In this paper, we present the distance-time directional delay (DTDD) model to detect the MITM attack in a variety of contexts and scenario. Indoor hotspots (InH) and urban micro-cellular (UMi) propagation environments were investigated to verify the reliability of the proposed approaches using realistic 5G millimeter-wave configurations and system setups. Simulations have been constructed based on the mmWave 5G channel simulator tool NYUSIM, in conjunction with a collection of machine learning algorithms (ML) including the extreme gradient boosting (XGBoost) and light gradient boosting machine (LGBM) as the core of the presented models and methodologies. Numerical simulations results produced a detection accuracy approaching 100% in the InH environment scenario, whereas for UMi environment scenario, a detection accuracy approaching 99% was attained.

第五代通信网络(5G)受到了学术界和工业界的广泛关注,它将通过连接异构设备和机器实现各种垂直应用。评估多种情况和环境下的可用性和可靠性至关重要。最近,研究人员重点研究和分析了采用人工智能(AI)技术的新型多媒体网络,以实现更高的数据传输速率和各方之间的安全通信流量。用户信息隐私和安全至关重要,也日益受到关注,这给防范攻击带来了不断变化的挑战。中间人(MITM)攻击被认为是最常见的攻击之一,攻击者可以冒充通信系统中的一方窃取用户数据或伪造恶意数据。由于在移动网络和类似系统中使用传统加密技术的局限性,人们引入了新的方法来根据物理层动态验证和认证传输信号。在本文中,我们提出了距离-时间-定向延迟(DTDD)模型,用于检测各种环境和场景下的 MITM 攻击。我们对室内热点(InH)和城市微蜂窝(UMi)的传播环境进行了研究,利用现实的 5G 毫米波配置和系统设置验证了所提方法的可靠性。模拟以毫米波 5G 信道模拟工具 NYUSIM 为基础,结合一系列机器学习算法 (ML),包括极端梯度提升 (XGBoost) 和光梯度提升机 (LGBM),作为所提出模型和方法的核心。数值模拟结果表明,在 InH 环境场景下,检测准确率接近 100%,而在 UMi 环境场景下,检测准确率接近 99%。
{"title":"Machine learning-based detection of the man-in-the-middle attack in the physical layer of 5G networks","authors":"Abdullah Qasem ,&nbsp;Ashraf Tahat","doi":"10.1016/j.simpat.2024.102998","DOIUrl":"10.1016/j.simpat.2024.102998","url":null,"abstract":"<div><p>Fifth generation communication networks (5G) has received a great deal of attention from academia and industry alike, which will enable a wide variety of vertical applications by connecting heterogeneous devices and machines. Assessing availability and reliability in many circumstances and environments is critical. Researchers have recently focused on investigating and analyzing new multimedia networks with artificial intelligence (AI) technologies to achieve higher data rates and secure communication traffic between parties. User information privacy and security are of vital importance and of growing concerns that present evolving challenges to overcome in preventing attacks. Man-in-the-middle (MITM) attack is considered one of the most common attacks, where an attacker can impersonate one of the parties in a communication system to steal user data or forge the malicious data. Due to the limitation of using conventional cryptographic techniques for mobile networks and similar systems, new methods have been introduced to validate and authenticate transmitted signals dynamically, depending on the physical layer. In this paper, we present the distance-time directional delay (DTDD) model to detect the MITM attack in a variety of contexts and scenario. Indoor hotspots (InH) and urban micro-cellular (UMi) propagation environments were investigated to verify the reliability of the proposed approaches using realistic 5G millimeter-wave configurations and system setups. Simulations have been constructed based on the mmWave 5G channel simulator tool NYUSIM, in conjunction with a collection of machine learning algorithms (ML) including the extreme gradient boosting (XGBoost) and light gradient boosting machine (LGBM) as the core of the presented models and methodologies. Numerical simulations results produced a detection accuracy approaching 100% in the InH environment scenario, whereas for UMi environment scenario, a detection accuracy approaching 99% was attained.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":"136 ","pages":"Article 102998"},"PeriodicalIF":3.5,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141700652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model-based approach for formal verification and performance evaluation of energy harvesting architectures in IoT systems: A case study of a long-term healthcare application 一种基于模型的方法,用于对物联网系统中的能量采集架构进行形式验证和性能评估:长期医疗保健应用案例研究
IF 3.5 2区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-07-10 DOI: 10.1016/j.simpat.2024.102990
Imene Ben Hafaiedh , Afef Gafsi , Mohamed Yassine Yahyaoui , Yasmine Aouinette

Energy harvesting plays a significant role in the Internet of Things (IoT). Indeed, although numerous approaches exist to limit the system’s power consumption, the energy provided by the battery remains constrained, thereby limiting the system’s lifetime. Energy harvesting represents an interesting technique that allows a set of devices in an IoT architecture to operate for a potentially infinite time without the need for battery replacement or recharge. This work presents a formal modeling framework for the performance evaluation of energy harvesting architectures and strategies in IoT systems. We present a model-based approach using UPPAAL to model and analyze IoT device lifetimes and capture the energy-related behavior of nodes and various energy harvesters. Furthermore, the model is calibrated using measurements acquired from real-life IoT applications to demonstrate the effectiveness of the proposed model and its ability to investigate various energy-related aspects.

能量收集在物联网(IoT)中发挥着重要作用。事实上,尽管有许多方法可以限制系统的功耗,但电池提供的能量仍然有限,从而限制了系统的使用寿命。能量收集是一种有趣的技术,它允许物联网架构中的一组设备在无需更换电池或充电的情况下无限期运行。这项研究提出了一个正式的建模框架,用于对物联网系统中的能量采集架构和策略进行性能评估。我们提出了一种基于模型的方法,使用 UPPAAL 对物联网设备寿命进行建模和分析,并捕捉节点和各种能量收集器的能量相关行为。此外,我们还利用从实际物联网应用中获取的测量数据对模型进行了校准,以证明所提模型的有效性及其研究各种能源相关方面的能力。
{"title":"A model-based approach for formal verification and performance evaluation of energy harvesting architectures in IoT systems: A case study of a long-term healthcare application","authors":"Imene Ben Hafaiedh ,&nbsp;Afef Gafsi ,&nbsp;Mohamed Yassine Yahyaoui ,&nbsp;Yasmine Aouinette","doi":"10.1016/j.simpat.2024.102990","DOIUrl":"10.1016/j.simpat.2024.102990","url":null,"abstract":"<div><p>Energy harvesting plays a significant role in the Internet of Things (IoT). Indeed, although numerous approaches exist to limit the system’s power consumption, the energy provided by the battery remains constrained, thereby limiting the system’s lifetime. Energy harvesting represents an interesting technique that allows a set of devices in an IoT architecture to operate for a potentially infinite time without the need for battery replacement or recharge. This work presents a formal modeling framework for the performance evaluation of energy harvesting architectures and strategies in IoT systems. We present a model-based approach using UPPAAL to model and analyze IoT device lifetimes and capture the energy-related behavior of nodes and various energy harvesters. Furthermore, the model is calibrated using measurements acquired from real-life IoT applications to demonstrate the effectiveness of the proposed model and its ability to investigate various energy-related aspects.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":"136 ","pages":"Article 102990"},"PeriodicalIF":3.5,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141630485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A unified risk field-based driving behavior model for car-following and lane-changing behaviors simulation 基于风险场的统一驾驶行为模型,用于模拟汽车跟车和变道行为
IF 3.5 2区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-07-09 DOI: 10.1016/j.simpat.2024.102991
Haitian Tan , Guangquan Lu , Zhaojie Wang , Jun Hua , Miaomiao Liu

The modeling of driving behavior is pivotal for the accurate simulation of traffic scenarios and for providing human-like decision-making of autonomous driving systems. Car-following (CF) and lane-changing (LC) behaviors are continuous maneuvers within traffic flow, generally modeled separately in the literature. The coherence between these two behaviors may be ignored, leading to unrealistic behavioral simulations. Therefore, this paper establishes a risk field-based driving behavior model for two-dimensional motion, ensuring coherent modeling of CF and LC behaviors under a unified framework. First, a risk quantification method is developed to calculate the risk in two-dimensional scenarios, accounting for risk over the preview time. A cubic polynomial is applied to generate path curves that align with vehicle dynamics. Second, the enhanced behavior model primarily comprises two integral components: path and trajectory planning. These two components aim to identify the path or trajectory that maximizes the benefit while meeting the desired risk. Third, the maximum acceptable risk, representing a higher risk than the desired risk, is defined to facilitate path adjustment and avoid frequent path adjustment. Finally, the proposed model is proved through comparisons with existing models using driving data. Several cases are employed for further analysis to show the model's rationality and potential in various aspects. This study develops the previous risk field-based behavior model from one-dimensional to two-dimensional scenarios, furnishes a unified framework for elucidating driving behavior in various scenarios, and contributes to the progress of behavior modeling.

驾驶行为建模对于准确模拟交通场景和为自动驾驶系统提供类人决策至关重要。跟车(CF)和变道(LC)行为是交通流中的连续动作,文献中通常将其分开建模。这两种行为之间的一致性可能会被忽略,从而导致不切实际的行为模拟。因此,本文建立了基于风险场的二维运动驾驶行为模型,确保在统一的框架下对 CF 和 LC 行为进行连贯建模。首先,本文开发了一种风险量化方法,用于计算二维场景中的风险,并考虑预览时间内的风险。应用三次多项式生成与车辆动力学相一致的路径曲线。其次,增强型行为模型主要包括两个组成部分:路径和轨迹规划。这两个部分的目的是确定既能获得最大收益又能满足预期风险的路径或轨迹。第三,定义最大可接受风险,即比期望风险更高的风险,以促进路径调整,避免频繁的路径调整。最后,通过使用驾驶数据与现有模型进行比较,证明了所提出的模型。通过几个案例的进一步分析,展示了模型的合理性和各方面的潜力。本研究将以往基于风险场的行为模型从一维场景发展到二维场景,为阐明各种场景下的驾驶行为提供了一个统一的框架,有助于行为建模的进步。
{"title":"A unified risk field-based driving behavior model for car-following and lane-changing behaviors simulation","authors":"Haitian Tan ,&nbsp;Guangquan Lu ,&nbsp;Zhaojie Wang ,&nbsp;Jun Hua ,&nbsp;Miaomiao Liu","doi":"10.1016/j.simpat.2024.102991","DOIUrl":"https://doi.org/10.1016/j.simpat.2024.102991","url":null,"abstract":"<div><p>The modeling of driving behavior is pivotal for the accurate simulation of traffic scenarios and for providing human-like decision-making of autonomous driving systems. Car-following (CF) and lane-changing (LC) behaviors are continuous maneuvers within traffic flow, generally modeled separately in the literature. The coherence between these two behaviors may be ignored, leading to unrealistic behavioral simulations. Therefore, this paper establishes a risk field-based driving behavior model for two-dimensional motion, ensuring coherent modeling of CF and LC behaviors under a unified framework. First, a risk quantification method is developed to calculate the risk in two-dimensional scenarios, accounting for risk over the preview time. A cubic polynomial is applied to generate path curves that align with vehicle dynamics. Second, the enhanced behavior model primarily comprises two integral components: path and trajectory planning. These two components aim to identify the path or trajectory that maximizes the benefit while meeting the desired risk. Third, the maximum acceptable risk, representing a higher risk than the desired risk, is defined to facilitate path adjustment and avoid frequent path adjustment. Finally, the proposed model is proved through comparisons with existing models using driving data. Several cases are employed for further analysis to show the model's rationality and potential in various aspects. This study develops the previous risk field-based behavior model from one-dimensional to two-dimensional scenarios, furnishes a unified framework for elucidating driving behavior in various scenarios, and contributes to the progress of behavior modeling.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":"136 ","pages":"Article 102991"},"PeriodicalIF":3.5,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141605165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Electromagnetic torque modeling and validation for a permanent magnet spherical motor based on XGBoost 基于 XGBoost 的永磁球形电机电磁扭矩建模与验证
IF 3.5 2区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-07-09 DOI: 10.1016/j.simpat.2024.102989
Xiwen Guo , Qiyong Yang , Qunjing Wang , Yuming Sun , Ao Tan

As a device characterized by multiple degrees of freedom in one driving unit, analytical electromagnetic torque modeling is needed for the rotor position tracking control of a Permanent Magnet Spherical Motor (PMSpM). In this paper, Extreme Gradient Boosting (XGBoost) was proposed to be employed for establishing the output relationship between the rotor position and the electromagnetic torque of PMSpM. The Finite Element Method (FEM) was applied to obtain train data and test data concerning the rotor position and electromagnetic torque of PMSpM. Particle Swarm Optimization (PSO) was applied to optimize partial parameters of XGBoost, which serves to enhance the modeling accuracy of electromagnetic torque via XGBoost. The predictive results of algorithms, including Random Forest (RF), Gradient Boosting Regression Tree (GBRT), Multi-task Gaussian Process (MTGP), and XGBoost, were compared with FEM results and experimental results over multiple indicators. The capability of XGBoost has been validated not only to perform modeling tasks within an abbreviated time span but also to generate models that display amplified accuracy and efficiency.

永磁球形电机(PMSpM)是一种在一个驱动单元中具有多个自由度的设备,因此需要对其转子位置跟踪控制进行电磁转矩分析建模。本文提出采用极端梯度提升法(XGBoost)来建立 PMSpM 转子位置与电磁转矩之间的输出关系。应用有限元法(FEM)获得了有关 PMSpM 转子位置和电磁扭矩的训练数据和测试数据。应用粒子群优化(PSO)来优化 XGBoost 的部分参数,从而通过 XGBoost 提高电磁转矩的建模精度。将随机森林(RF)、梯度提升回归树(GBRT)、多任务高斯过程(MTGP)和 XGBoost 等算法的预测结果与有限元结果和多个指标的实验结果进行了比较。XGBoost 的能力得到了验证,它不仅能在较短的时间内完成建模任务,还能生成显示出更高精度和效率的模型。
{"title":"Electromagnetic torque modeling and validation for a permanent magnet spherical motor based on XGBoost","authors":"Xiwen Guo ,&nbsp;Qiyong Yang ,&nbsp;Qunjing Wang ,&nbsp;Yuming Sun ,&nbsp;Ao Tan","doi":"10.1016/j.simpat.2024.102989","DOIUrl":"10.1016/j.simpat.2024.102989","url":null,"abstract":"<div><p>As a device characterized by multiple degrees of freedom in one driving unit, analytical electromagnetic torque modeling is needed for the rotor position tracking control of a Permanent Magnet Spherical Motor (PMSpM). In this paper, Extreme Gradient Boosting (XGBoost) was proposed to be employed for establishing the output relationship between the rotor position and the electromagnetic torque of PMSpM. The Finite Element Method (FEM) was applied to obtain train data and test data concerning the rotor position and electromagnetic torque of PMSpM. Particle Swarm Optimization (PSO) was applied to optimize partial parameters of XGBoost, which serves to enhance the modeling accuracy of electromagnetic torque via XGBoost. The predictive results of algorithms, including Random Forest (RF), Gradient Boosting Regression Tree (GBRT), Multi-task Gaussian Process (MTGP), and XGBoost, were compared with FEM results and experimental results over multiple indicators. The capability of XGBoost has been validated not only to perform modeling tasks within an abbreviated time span but also to generate models that display amplified accuracy and efficiency.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":"136 ","pages":"Article 102989"},"PeriodicalIF":3.5,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141622370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fully decentralized privacy-enabled Federated Learning system based on Byzantine-resilient consensus protocol 基于拜占庭弹性共识协议的完全去中心化、支持隐私的联盟学习系统
IF 3.5 2区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-07-06 DOI: 10.1016/j.simpat.2024.102987
Andras Ferenczi, Costin Bădică

We present a novel blockchain-based Federated Learning (FL) system that introduces a Byzantine-resilient consensus protocol that performs well in the presence of adversarial participants. Unlike existing state-of-the-art, this system can be deployed in a fully decentralized manner, meaning it does not rely on any single actor to function correctly. Using a Smart Contract-driven workflow coupled with a commitment scheme and a differential privacy-based solution, we ensure training integrity, prevent plagiarism, and protect against leakage of sensitive data while performing effective federated training. We demonstrate the system’s effectiveness by performing simulation and implementation of an end-to-end proof of concept. Our practical implementation showcases the system’s efficiency on a single computer with multiple trainers, revealing low memory demands and manageable network and block I/O, which suggest scalability to larger, more complex networks. The paper concludes by exploring future enhancements, including advanced cryptographic methods for enhanced privacy and potential applications extending the system’s utility to broader domains within FL. Our work lays the groundwork for a new generation of decentralized learning systems, promising increased adoption in real-world scenarios where data privacy and security are of paramount concern.

我们提出了一种基于区块链的新型联盟学习(FL)系统,该系统引入了一种拜占庭抗扰共识协议,在存在敌对参与者的情况下也能表现出色。与现有的最先进系统不同,该系统可以完全去中心化的方式部署,这意味着它不依赖于任何单一行为者来正确运行。利用智能合约驱动的工作流程、承诺方案和基于隐私的差异化解决方案,我们可以确保训练的完整性、防止剽窃、防止敏感数据泄露,同时进行有效的联合训练。我们通过模拟和实施端到端概念验证来证明该系统的有效性。我们的实际实施展示了该系统在单台计算机和多个训练器上的效率,显示出较低的内存需求以及可管理的网络和块 I/O,这表明该系统可扩展到更大、更复杂的网络。论文最后探讨了未来的改进,包括增强隐私性的高级加密方法,以及将该系统的实用性扩展到 FL 中更广泛领域的潜在应用。我们的工作为新一代去中心化学习系统奠定了基础,有望在数据隐私和安全至关重要的现实世界场景中得到更多采用。
{"title":"Fully decentralized privacy-enabled Federated Learning system based on Byzantine-resilient consensus protocol","authors":"Andras Ferenczi,&nbsp;Costin Bădică","doi":"10.1016/j.simpat.2024.102987","DOIUrl":"10.1016/j.simpat.2024.102987","url":null,"abstract":"<div><p>We present a novel blockchain-based Federated Learning (FL) system that introduces a Byzantine-resilient consensus protocol that performs well in the presence of adversarial participants. Unlike existing state-of-the-art, this system can be deployed in a fully decentralized manner, meaning it does not rely on any single actor to function correctly. Using a Smart Contract-driven workflow coupled with a commitment scheme and a differential privacy-based solution, we ensure training integrity, prevent plagiarism, and protect against leakage of sensitive data while performing effective federated training. We demonstrate the system’s effectiveness by performing simulation and implementation of an end-to-end proof of concept. Our practical implementation showcases the system’s efficiency on a single computer with multiple trainers, revealing low memory demands and manageable network and block I/O, which suggest scalability to larger, more complex networks. The paper concludes by exploring future enhancements, including advanced cryptographic methods for enhanced privacy and potential applications extending the system’s utility to broader domains within FL. Our work lays the groundwork for a new generation of decentralized learning systems, promising increased adoption in real-world scenarios where data privacy and security are of paramount concern.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":"136 ","pages":"Article 102987"},"PeriodicalIF":3.5,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1569190X24001011/pdfft?md5=eca713730aa3fea4361d904312891ea2&pid=1-s2.0-S1569190X24001011-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141710969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “A dynamic simulation framework based on hybrid modeling paradigm for parallel scheduling systems in warehouses” [Simulation Modelling Practice and Theory 133 (2024) 1–24 /102921] 基于混合建模范式的仓库并行调度系统动态仿真框架》[《仿真建模实践与理论》133 (2024) 1-24 /102921] 更正
IF 3.5 2区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-07-03 DOI: 10.1016/j.simpat.2024.102985
YuQin Zeng , WenBing Li , ChangHai Li
{"title":"Corrigendum to “A dynamic simulation framework based on hybrid modeling paradigm for parallel scheduling systems in warehouses” [Simulation Modelling Practice and Theory 133 (2024) 1–24 /102921]","authors":"YuQin Zeng ,&nbsp;WenBing Li ,&nbsp;ChangHai Li","doi":"10.1016/j.simpat.2024.102985","DOIUrl":"10.1016/j.simpat.2024.102985","url":null,"abstract":"","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":"135 ","pages":"Article 102985"},"PeriodicalIF":3.5,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1569190X24000996/pdfft?md5=91913f8c6200706efeb7943d8267e07d&pid=1-s2.0-S1569190X24000996-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141630811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microscopic simulation of bicycle traffic flow incorporating cyclists’ heterogeneous dynamics and non-lane-based movement strategies 自行车交通流的微观模拟,包含骑车人的异质动态和非基于车道的移动策略
IF 3.5 2区 计算机科学 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-07-03 DOI: 10.1016/j.simpat.2024.102986
Johannes S. Brunner , Ying-Chuan Ni , Anastasios Kouvelas, Michail A. Makridis

Cycling as a mode of transport is on an upward trend as a low-emission alternative to driving in urbanized areas nowadays. With the increasing number of cyclists, it is of great importance to assess the capacity of cycling infrastructure in practice. Simulation models are useful tools to investigate bicycle flow performance considering cyclists’ distinct moving behaviors. However, existing bicycle simulation models are restricted by either space discretization, lane-based setup, adaptation from models for car traffic, or complicated calibration requirement in a force-based environment. In addition, cyclists’ decision-making ability in the operational-level cycling behavior are not well-captured in these models. This paper proposes a comprehensible microscopic bicycle simulation model which includes a detailed decision-making process and the ability to simulate continuous-space lateral movement. The model consists of three levels, maneuver decision, movement planning, and physical acceleration. It is able to simulate bicycle flow dynamics in undersaturated traffic conditions on an exclusive bike path. As we do not intend to show the empirical validity of the proposed model, the simulation experiment aims at verifying the model and exploring bicycle flow performance in various scenarios by estimating the fundamental diagrams (FDs). The effect of different path widths on bicycle flow capacity is first explored. Other behavioral factors, including desired speed heterogeneity, overtaking incentive, and safety region size perceived by cyclists, which can potentially influence the shape of the FD are also tested. The model can be further extended to simulate relatively complex cycling behavior with cooperative and anticipative strategies and investigate bicycle flow characteristics in congested traffic conditions.

如今,在城市化地区,骑自行车作为一种低排放的替代驾驶方式,正呈上升趋势。随着骑自行车的人数不断增加,对自行车基础设施的实际通行能力进行评估就显得尤为重要。考虑到骑车人独特的移动行为,仿真模型是研究自行车流性能的有用工具。然而,现有的自行车仿真模型受到空间离散化、基于车道的设置、汽车交通模型的调整或基于力的环境中复杂的校准要求等因素的限制。此外,这些模型无法很好地捕捉到骑车人在操作层面骑车行为中的决策能力。本文提出了一种可理解的微观自行车仿真模型,其中包括详细的决策过程和模拟连续空间横向运动的能力。该模型包括三个层次:机动决策、运动规划和物理加速。它能够模拟自行车专用道上未饱和交通条件下的自行车流动态。由于我们并不打算展示所提模型的经验有效性,因此模拟实验旨在验证该模型,并通过估算基本图(FDs)来探索自行车流在各种情况下的表现。首先探讨了不同路径宽度对自行车流量的影响。此外,还测试了其他可能影响基本图形状的行为因素,包括期望速度异质性、超车动机和骑车人感知到的安全区域大小。该模型可进一步扩展,以模拟具有合作和预期策略的相对复杂的骑车行为,并研究拥堵交通条件下的自行车流特征。
{"title":"Microscopic simulation of bicycle traffic flow incorporating cyclists’ heterogeneous dynamics and non-lane-based movement strategies","authors":"Johannes S. Brunner ,&nbsp;Ying-Chuan Ni ,&nbsp;Anastasios Kouvelas,&nbsp;Michail A. Makridis","doi":"10.1016/j.simpat.2024.102986","DOIUrl":"https://doi.org/10.1016/j.simpat.2024.102986","url":null,"abstract":"<div><p>Cycling as a mode of transport is on an upward trend as a low-emission alternative to driving in urbanized areas nowadays. With the increasing number of cyclists, it is of great importance to assess the capacity of cycling infrastructure in practice. Simulation models are useful tools to investigate bicycle flow performance considering cyclists’ distinct moving behaviors. However, existing bicycle simulation models are restricted by either space discretization, lane-based setup, adaptation from models for car traffic, or complicated calibration requirement in a force-based environment. In addition, cyclists’ decision-making ability in the operational-level cycling behavior are not well-captured in these models. This paper proposes a comprehensible microscopic bicycle simulation model which includes a detailed decision-making process and the ability to simulate continuous-space lateral movement. The model consists of three levels, maneuver decision, movement planning, and physical acceleration. It is able to simulate bicycle flow dynamics in undersaturated traffic conditions on an exclusive bike path. As we do not intend to show the empirical validity of the proposed model, the simulation experiment aims at verifying the model and exploring bicycle flow performance in various scenarios by estimating the fundamental diagrams (FDs). The effect of different path widths on bicycle flow capacity is first explored. Other behavioral factors, including desired speed heterogeneity, overtaking incentive, and safety region size perceived by cyclists, which can potentially influence the shape of the FD are also tested. The model can be further extended to simulate relatively complex cycling behavior with cooperative and anticipative strategies and investigate bicycle flow characteristics in congested traffic conditions.</p></div>","PeriodicalId":49518,"journal":{"name":"Simulation Modelling Practice and Theory","volume":"135 ","pages":"Article 102986"},"PeriodicalIF":3.5,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Simulation Modelling Practice and Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1