首页 > 最新文献

Cluster Computing最新文献

英文 中文
An effective partition-based framework for virtual machine migration in cloud services 基于分区的云服务虚拟机迁移有效框架
Pub Date : 2024-06-19 DOI: 10.1007/s10586-024-04610-4
Liji Luo, Siwei Wei, Hua Tang, Chunzhi Wang

As the scale of data centers continues to expand, optimizing resource utilization becomes increasingly critical. Employing virtual machine (VM) migration technology to maintain hosts within an appropriate workload range holds substantial promise for enhancing platform resource utilization, workload equilibrium, and energy efficiency. This study endeavors to reframe virtual machine migration as a partition problem and introduces an integrated framework that adeptly evaluate workload status and precisely identifies the optimal migration target, thus mitigating the expenses associated with virtual machine migration. Our framework commences by employing workload prediction to evaluate host status for determining the most opportune timing for migration. Subsequently, we leverage Service Level Agreements (SLA) violation as the optimization objective to ascertain the optimal status threshold, thereby facilitating effective workload partition of the host. Finally, the framework employs multi-dimensional host resource balance as a guide to schedule host migration in diverse areas, ensuring robust resource utilization post-migration. Experimental results show that compared with three benchmark VM allocation algorithms, SESA, PPRG, and ThrRs. Our framework achieves a significant (17%) increase in multidimensional resource utilization across various types of data centers, accompanied by a noteworthy (27%) reduction in SLA violation rate with fewer time consumption and energy expenditure during VM migration.

随着数据中心规模的不断扩大,优化资源利用率变得越来越重要。采用虚拟机(VM)迁移技术将主机保持在适当的工作负载范围内,对提高平台资源利用率、工作负载平衡和能源效率大有裨益。本研究致力于将虚拟机迁移重构为一个分区问题,并引入了一个集成框架,该框架能有效评估工作负载状态,精确确定最佳迁移目标,从而降低与虚拟机迁移相关的费用。我们的框架首先利用工作负载预测来评估主机状态,以确定最合适的迁移时机。随后,我们利用违反服务水平协议(SLA)作为优化目标,以确定最佳状态阈值,从而促进对主机进行有效的工作负载分区。最后,该框架采用多维主机资源平衡作为指导,在不同区域安排主机迁移,确保迁移后资源的稳健利用。实验结果表明,与 SESA、PPRG 和 ThrRs 这三种基准虚拟机分配算法相比,我们的框架实现了显著的性能提升。我们的框架在各种类型的数据中心实现了多维资源利用率的显著提高,同时在虚拟机迁移过程中减少了时间消耗和能源消耗,显著降低了SLA违反率。
{"title":"An effective partition-based framework for virtual machine migration in cloud services","authors":"Liji Luo, Siwei Wei, Hua Tang, Chunzhi Wang","doi":"10.1007/s10586-024-04610-4","DOIUrl":"https://doi.org/10.1007/s10586-024-04610-4","url":null,"abstract":"<p>As the scale of data centers continues to expand, optimizing resource utilization becomes increasingly critical. Employing virtual machine (VM) migration technology to maintain hosts within an appropriate workload range holds substantial promise for enhancing platform resource utilization, workload equilibrium, and energy efficiency. This study endeavors to reframe virtual machine migration as a partition problem and introduces an integrated framework that adeptly evaluate workload status and precisely identifies the optimal migration target, thus mitigating the expenses associated with virtual machine migration. Our framework commences by employing workload prediction to evaluate host status for determining the most opportune timing for migration. Subsequently, we leverage Service Level Agreements (SLA) violation as the optimization objective to ascertain the optimal status threshold, thereby facilitating effective workload partition of the host. Finally, the framework employs multi-dimensional host resource balance as a guide to schedule host migration in diverse areas, ensuring robust resource utilization post-migration. Experimental results show that compared with three benchmark VM allocation algorithms, SESA, PPRG, and ThrRs. Our framework achieves a significant <span>(17%)</span> increase in multidimensional resource utilization across various types of data centers, accompanied by a noteworthy <span>(27%)</span> reduction in SLA violation rate with fewer time consumption and energy expenditure during VM migration.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141531733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCRUB: a novel energy-efficient virtual machines selection and migration scheme in cloud data centers SCRUB:云数据中心中的新型节能虚拟机选择和迁移方案
Pub Date : 2024-06-18 DOI: 10.1007/s10586-024-04551-y
Mohammad Yekta, Hadi Shahriar Shahhoseini

The extensive deployment of large cloud data centers has led to substantial energy consumption. Energy conservation is a critical concern for cloud service providers seeking to lower their operating costs within their data centers. To address this energy consumption challenge, effective approaches such as VM consolidation and VM migration are essential. These approaches must carefully balance the trade-off between energy consumption and Service Level Agreement Violations (SLAV). In this paper, we propose an energy-efficient VM selection algorithm for VM consolidation and call it the Simultaneous CPU–Ram Utilization Balancer (SCRUB) policy. This algorithm takes into account CPU and RAM utilization while trying to maintain a balance between energy consumption and SLAV. To evaluate the performance of our proposed method, we implemented it using the Cloudsim simulation toolkit and conducted simulations using real-world workload traces from PlanetLab and Google over three different days. The results show that the SCRUB VM selection policy has led to improvements in various metrics, including reduced energy consumption and a decreased number of VM migrations compared to existing VM selection policies. Specifically, it achieved a 16.98% decrease in energy consumption and a 46.42% reduction in the number of migrations for the PlanetLab dataset, and a 10.95% decrease in energy consumption and a 43.96% decline in the number of migrations for the Google dataset compared to the baseline algorithm MMT.

大型云数据中心的广泛部署导致了大量能源消耗。对于希望降低数据中心运营成本的云服务提供商来说,节能是一个至关重要的问题。要应对这一能耗挑战,虚拟机整合和虚拟机迁移等有效方法至关重要。这些方法必须在能耗和违反服务级别协议(SLAV)之间谨慎权衡。在本文中,我们提出了一种用于虚拟机整合的高能效虚拟机选择算法,并将其称为 "CPU-内存同时利用平衡器(SCRUB)策略"。该算法考虑了 CPU 和 RAM 的利用率,同时努力保持能耗和 SLAV 之间的平衡。为了评估我们提出的方法的性能,我们使用 Cloudsim 仿真工具包实施了该方法,并使用 PlanetLab 和 Google 在三个不同日期的真实工作负载跟踪进行了仿真。结果表明,与现有的虚拟机选择策略相比,SCRUB 虚拟机选择策略改善了各种指标,包括降低能耗和减少虚拟机迁移次数。具体来说,与基准算法MMT相比,SCRUB在PlanetLab数据集上实现了16.98%的能耗降低和46.42%的迁移次数减少,在Google数据集上实现了10.95%的能耗降低和43.96%的迁移次数减少。
{"title":"SCRUB: a novel energy-efficient virtual machines selection and migration scheme in cloud data centers","authors":"Mohammad Yekta, Hadi Shahriar Shahhoseini","doi":"10.1007/s10586-024-04551-y","DOIUrl":"https://doi.org/10.1007/s10586-024-04551-y","url":null,"abstract":"<p>The extensive deployment of large cloud data centers has led to substantial energy consumption. Energy conservation is a critical concern for cloud service providers seeking to lower their operating costs within their data centers. To address this energy consumption challenge, effective approaches such as VM consolidation and VM migration are essential. These approaches must carefully balance the trade-off between energy consumption and Service Level Agreement Violations (SLAV). In this paper, we propose an energy-efficient VM selection algorithm for VM consolidation and call it the Simultaneous CPU–Ram Utilization Balancer (SCRUB) policy. This algorithm takes into account CPU and RAM utilization while trying to maintain a balance between energy consumption and SLAV. To evaluate the performance of our proposed method, we implemented it using the Cloudsim simulation toolkit and conducted simulations using real-world workload traces from PlanetLab and Google over three different days. The results show that the SCRUB VM selection policy has led to improvements in various metrics, including reduced energy consumption and a decreased number of VM migrations compared to existing VM selection policies. Specifically, it achieved a 16.98% decrease in energy consumption and a 46.42% reduction in the number of migrations for the PlanetLab dataset, and a 10.95% decrease in energy consumption and a 43.96% decline in the number of migrations for the Google dataset compared to the baseline algorithm MMT.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved Tasmanian devil optimization algorithm based on sine-cosine strategy with dynamic weighting factors 基于具有动态加权因子的正弦余弦策略的改进型塔斯马尼亚恶魔优化算法
Pub Date : 2024-06-18 DOI: 10.1007/s10586-024-04443-1
Huanlong Zhang, Chenglin Guo, Jianwei Zhang, Xin Wang, Jiaxiang Zhang

In this paper, aiming at the problem that the balance between exploration and exploitation of traditional Tasmanian devil optimization algorithm is unflexible, and easy to fall into local optimum, an improved Tasmanian devil optimization algorithm (NTDO) based on the sine-cosine strategy of dynamic weighted factors is proposed. The designed method balances the global and local search capabilities of the algorithm, effectively improves the situation that the algorithm falls into local optimum, and integrally improves the optimization performance of the algorithm. Firstly, the good point set theory is used instead of the traditional random method to find the initial individuals, which can render the initial population is more evenly distributed in the search space and the population diversity is improved. Secondly, A sine-cosine strategy based on dynamic weighted factors is proposed to coordinate the global exploration and local optimization capabilities of the algorithm, and enhance the convergence accuracy of the algorithm. Thirdly, since Tasmanian devil is easy to fall into local optimum in the process of hunting prey, a nonlinear decline strategy based on oscillation factor is presented, which increases the search range of the algorithm and improves the ability of the algorithm to jump out of the local optimal value.Finally, 12 evaluation functions, cec2019 and cec2021 test functions commonly used in NTDO and TDO, WOA, DBO, PSO, GWO, DFPSO and PDGWO algorithms are compared and analyzed, and the experimental results show the effectiveness and feasibility of the scheme.

本文针对传统塔斯马尼亚魔鬼优化算法探索与利用平衡不灵活、易陷入局部最优的问题,提出了一种基于动态加权因子正余弦策略的改进塔斯马尼亚魔鬼优化算法(NTDO)。所设计的方法平衡了算法的全局和局部搜索能力,有效改善了算法陷入局部最优的情况,综合提高了算法的优化性能。首先,用好点集理论代替传统的随机方法寻找初始个体,使初始种群在搜索空间中分布更均匀,提高了种群多样性。其次,提出了基于动态加权因子的正余弦策略,协调了算法的全局探索和局部优化能力,提高了算法的收敛精度。第三,由于塔斯马尼亚恶魔在捕食猎物过程中容易陷入局部最优,提出了基于振荡因子的非线性下降策略,增加了算法的搜索范围,提高了算法跳出局部最优值的能力。最后,对 NTDO 和 TDO、WOA、DBO、PSO、GWO、DFPSO 和 PDGWO 算法中常用的 12 个评价函数、cec2019 和 cec2021 测试函数进行了对比分析,实验结果表明了该方案的有效性和可行性。
{"title":"An improved Tasmanian devil optimization algorithm based on sine-cosine strategy with dynamic weighting factors","authors":"Huanlong Zhang, Chenglin Guo, Jianwei Zhang, Xin Wang, Jiaxiang Zhang","doi":"10.1007/s10586-024-04443-1","DOIUrl":"https://doi.org/10.1007/s10586-024-04443-1","url":null,"abstract":"<p>In this paper, aiming at the problem that the balance between exploration and exploitation of traditional Tasmanian devil optimization algorithm is unflexible, and easy to fall into local optimum, an improved Tasmanian devil optimization algorithm (NTDO) based on the sine-cosine strategy of dynamic weighted factors is proposed. The designed method balances the global and local search capabilities of the algorithm, effectively improves the situation that the algorithm falls into local optimum, and integrally improves the optimization performance of the algorithm. Firstly, the good point set theory is used instead of the traditional random method to find the initial individuals, which can render the initial population is more evenly distributed in the search space and the population diversity is improved. Secondly, A sine-cosine strategy based on dynamic weighted factors is proposed to coordinate the global exploration and local optimization capabilities of the algorithm, and enhance the convergence accuracy of the algorithm. Thirdly, since Tasmanian devil is easy to fall into local optimum in the process of hunting prey, a nonlinear decline strategy based on oscillation factor is presented, which increases the search range of the algorithm and improves the ability of the algorithm to jump out of the local optimal value.Finally, 12 evaluation functions, cec2019 and cec2021 test functions commonly used in NTDO and TDO, WOA, DBO, PSO, GWO, DFPSO and PDGWO algorithms are compared and analyzed, and the experimental results show the effectiveness and feasibility of the scheme.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revolutionizing agri-food supply chain management with blockchain-based traceability and navigation integration 以区块链为基础的溯源和导航集成为农业食品供应链管理带来革命性变革
Pub Date : 2024-06-18 DOI: 10.1007/s10586-024-04609-x
Manoj Aggarwal, Pritam Rani, Prity Rani, Pratima Sharma

In the modern, ever-shifting global agri-food environment, the topmost concern revolves around securing the safety, quality, and authenticity of agri-food products. Blockchain technology is being seen as a revolutionary solution for dealing with these issues, providing a decentralized and transparent ledger for the tracking of agri-food products. By incorporating global positioning system and navigation systems within blockchain-based traceability solutions amplifies the capabilities for real-time monitoring, security, and trust. This paper proposes a layered architecture for an efficient agri-food traceability system. The data layer, manages interactions between various entities in the supply chain management and generates agri-food product-related data. The blockchain layer manages data via transactions and smart contracts, using the interplanetary file system for secure, decentralized storage. The navigation layer, combines navigation with Indian constellation and global positioning system to offer precise real-time positioning and timing services, enhancing product tracking. This integrated approach not only improves food safety but also supports sustainability efforts by reducing food waste and bolstering consumer trust in the agri-food industry. We implement the proposed system using Remix IDE, MetaMask wallet, and the Sepolia test network, summarizing the deployment analysis. Performance evaluation is conducted using the JMeter simulation toolkit.The proposed framework achieves an average throughput of 329.26 transactions per second, latency of 49.3 ms, and response time of 87.9 ms. We conduct a comparative evaluation of the proposed system with related studies. From this comparative analysis, we observed that our proposed framework has better features than other related works.

在不断变化的现代全球农业食品环境中,人们最关心的问题是确保农业食品的安全、质量和真实性。区块链技术被视为解决这些问题的革命性方案,它为追踪农业食品产品提供了一个去中心化的透明分类账。将全球定位系统和导航系统纳入基于区块链的可追溯解决方案,可增强实时监控、安全和信任的能力。本文提出了高效农业食品溯源系统的分层架构。数据层管理供应链管理中各实体之间的互动,并生成与农业食品产品相关的数据。区块链层通过交易和智能合约管理数据,使用星际文件系统进行安全、分散的存储。导航层将导航与印度星座和全球定位系统相结合,提供精确的实时定位和计时服务,加强产品跟踪。这种集成方法不仅能提高食品安全,还能减少食品浪费,增强消费者对农业食品行业的信任,从而支持可持续发展。我们使用 Remix IDE、MetaMask 钱包和 Sepolia 测试网络实现了提议的系统,并总结了部署分析。我们使用 JMeter 仿真工具包进行了性能评估。拟议框架的平均吞吐量为每秒 329.26 笔交易,延迟时间为 49.3 毫秒,响应时间为 87.9 毫秒。我们将拟议系统与相关研究进行了比较评估。通过比较分析,我们发现我们提出的框架比其他相关研究具有更好的功能。
{"title":"Revolutionizing agri-food supply chain management with blockchain-based traceability and navigation integration","authors":"Manoj Aggarwal, Pritam Rani, Prity Rani, Pratima Sharma","doi":"10.1007/s10586-024-04609-x","DOIUrl":"https://doi.org/10.1007/s10586-024-04609-x","url":null,"abstract":"<p>In the modern, ever-shifting global agri-food environment, the topmost concern revolves around securing the safety, quality, and authenticity of agri-food products. Blockchain technology is being seen as a revolutionary solution for dealing with these issues, providing a decentralized and transparent ledger for the tracking of agri-food products. By incorporating global positioning system and navigation systems within blockchain-based traceability solutions amplifies the capabilities for real-time monitoring, security, and trust. This paper proposes a layered architecture for an efficient agri-food traceability system. The data layer, manages interactions between various entities in the supply chain management and generates agri-food product-related data. The blockchain layer manages data via transactions and smart contracts, using the interplanetary file system for secure, decentralized storage. The navigation layer, combines navigation with Indian constellation and global positioning system to offer precise real-time positioning and timing services, enhancing product tracking. This integrated approach not only improves food safety but also supports sustainability efforts by reducing food waste and bolstering consumer trust in the agri-food industry. We implement the proposed system using Remix IDE, MetaMask wallet, and the Sepolia test network, summarizing the deployment analysis. Performance evaluation is conducted using the JMeter simulation toolkit.The proposed framework achieves an average throughput of 329.26 transactions per second, latency of 49.3 ms, and response time of 87.9 ms. We conduct a comparative evaluation of the proposed system with related studies. From this comparative analysis, we observed that our proposed framework has better features than other related works.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCIDP–Secure cloud-integrated data dissemination protocol for efficient reprogramming in internet of things SCIDP-面向物联网高效重编程的安全云集成数据传播协议
Pub Date : 2024-06-17 DOI: 10.1007/s10586-024-04570-9
R. Shanmugapriya, S. V. N. Santhosh Kumar

Base station (BS) offers data dissemination as a service to IoT smart devices, enabling efficient reprogramming or reconfiguration for their intended activities in post-deployment. Most of the existing IoT data dissemination schemes rely on flooding, leading to the Redundant Broadcast Storm Problem (RBSP), where multiple sensor nodes repeatedly transmit redundant data to neighbours. RBSP elevates network energy consumption and sender congestion in the network. Given that IoT smart devices communicate through open wireless mediums with the internet as a backbone, they are vulnerable to various malicious threats during data dissemination. Intruders may engage in malicious activities and compromise configuration parameters, leading to device failure to execute intended services. This paper proposes a Secure Cloud-Integrated Data Dissemination Protocol (SCIDP) aimed at ensuring the secure dissemination of data within cloud-integrated environments to mitigate RBSP’s impact and enhances security for performing effective reprogramming of sensor devices in IoT. The proposed protocol is implemented by using NS3 simulator with realistic simulation parameters. Simulation results indicate that the proposed protocol enhances energy efficiency by 12%, dissemination effectiveness by 16%, and network lifespan by 16%. Furthermore, the proposed system decreases communication overhead by 11% and computational costs by 9% compared to alternative existing protocols. From the formal security analysis, the proposed system proves that it can withstand against various kinds of security attacks in the network.

基站(BS)为物联网智能设备提供数据传播服务,使其在部署后能够高效地重新编程或重新配置以开展预期活动。大多数现有的物联网数据传播方案都依赖于泛洪,从而导致冗余广播风暴问题(RBSP),即多个传感器节点重复向邻居传输冗余数据。RBSP 会增加网络能耗和网络中的发送拥塞。鉴于物联网智能设备通过以互联网为骨干的开放式无线介质进行通信,它们在数据传播过程中很容易受到各种恶意威胁。入侵者可能从事恶意活动并破坏配置参数,导致设备无法执行预期服务。本文提出了一种安全云集成数据传播协议(SCIDP),旨在确保云集成环境中数据的安全传播,以减轻 RBSP 的影响,并增强对物联网中传感器设备进行有效重新编程的安全性。所提协议使用 NS3 仿真器和真实的仿真参数来实现。仿真结果表明,所提协议的能效提高了 12%,传播效果提高了 16%,网络寿命提高了 16%。此外,与其他现有协议相比,建议的系统减少了 11% 的通信开销和 9% 的计算成本。从正式的安全性分析来看,所提出的系统可以抵御网络中的各种安全攻击。
{"title":"SCIDP–Secure cloud-integrated data dissemination protocol for efficient reprogramming in internet of things","authors":"R. Shanmugapriya, S. V. N. Santhosh Kumar","doi":"10.1007/s10586-024-04570-9","DOIUrl":"https://doi.org/10.1007/s10586-024-04570-9","url":null,"abstract":"<p>Base station (BS) offers data dissemination as a service to IoT smart devices, enabling efficient reprogramming or reconfiguration for their intended activities in post-deployment. Most of the existing IoT data dissemination schemes rely on flooding, leading to the Redundant Broadcast Storm Problem (RBSP), where multiple sensor nodes repeatedly transmit redundant data to neighbours. RBSP elevates network energy consumption and sender congestion in the network. Given that IoT smart devices communicate through open wireless mediums with the internet as a backbone, they are vulnerable to various malicious threats during data dissemination. Intruders may engage in malicious activities and compromise configuration parameters, leading to device failure to execute intended services. This paper proposes a Secure Cloud-Integrated Data Dissemination Protocol (SCIDP) aimed at ensuring the secure dissemination of data within cloud-integrated environments to mitigate RBSP’s impact and enhances security for performing effective reprogramming of sensor devices in IoT. The proposed protocol is implemented by using NS3 simulator with realistic simulation parameters. Simulation results indicate that the proposed protocol enhances energy efficiency by 12%, dissemination effectiveness by 16%, and network lifespan by 16%. Furthermore, the proposed system decreases communication overhead by 11% and computational costs by 9% compared to alternative existing protocols. From the formal security analysis, the proposed system proves that it can withstand against various kinds of security attacks in the network.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Res2Net-ERNN: deep learning based cyberattack classification in software defined network Res2Net-ERNN:基于深度学习的软件定义网络攻击分类
Pub Date : 2024-06-17 DOI: 10.1007/s10586-024-04581-6
Mamatha Maddu, Yamarthi Narasimha Rao

Software-defined networking (SDN) is known for its enhanced network programmability and adaptability, but maintaining strong safety precautions to protect against emerging cyber-attacks remains a constant issue. Since SDN has logically centralized control, an attack on the controller might paralyze the entire network. For this reason, intrusion detection is very crucial. Many academics have embraced state-of-the-art techniques to assess and identify these assaults. However, the majority of these approaches lack scalability and accuracy. Moreover, they had difficulties with restricted features, low efficiency, incorrect characteristics, and computing complexity. Therefore, to detect network vulnerabilities in SDN-based IoT networks, we developed a practical deep learning approach based on Res2Net and Elman Recurrent Neural Networks (ERNN) technique as a defense solution to detect security issues in SDN. This framework consists of multiple steps and starts by addressing the dataset’s class imbalance issue with a Data Augmentation Generative Adversarial Network (DAGAN). Next, the Res2net and Enhanced Honey Badger Algorithm (EHBA) are used to extract and select features. This lowers the computational expense and lessens the possibility that the model would be misled by unsuitable and negative characteristics. Finally, an ERNN-based technique is used to detect and classify the intrusions in SDN. After seeing the network assaults, a practical mitigation framework is implemented to mitigate the network attacks. Three SDN IoT-focused datasets, InSDN, IoT-23 and ToN-IoT, are used in an experimental investigation to analyze the proposed framework’s performance. The results of numerous trials show that the proposed method outperforms existing techniques regarding several constraints.

软件定义网络(SDN)以其增强的网络可编程性和适应性而闻名,但如何保持强大的安全防范措施以抵御新出现的网络攻击仍是一个长期问题。由于 SDN 具有逻辑上的集中控制,对控制器的攻击可能导致整个网络瘫痪。因此,入侵检测至关重要。许多学者已经采用了最先进的技术来评估和识别这些攻击。然而,这些方法大多缺乏可扩展性和准确性。此外,它们还存在功能受限、效率低、特征不正确和计算复杂等问题。因此,为了检测基于 SDN 的物联网网络中的网络漏洞,我们开发了一种基于 Res2Net 和 Elman 循环神经网络(ERNN)技术的实用深度学习方法,作为检测 SDN 中安全问题的防御解决方案。该框架由多个步骤组成,首先使用数据增强生成对抗网络(DAGAN)解决数据集的类不平衡问题。然后,使用 Res2net 和增强型蜜獾算法(EHBA)来提取和选择特征。这不仅降低了计算成本,还减少了模型被不合适的负面特征误导的可能性。最后,基于 ERNN 的技术被用于检测和分类 SDN 中的入侵。在发现网络攻击后,实施了一个实用的缓解框架来缓解网络攻击。在实验调查中使用了三个以 SDN 物联网为重点的数据集:InSDN、IoT-23 和 ToN-IoT,以分析拟议框架的性能。大量试验结果表明,建议的方法在多个限制条件方面优于现有技术。
{"title":"Res2Net-ERNN: deep learning based cyberattack classification in software defined network","authors":"Mamatha Maddu, Yamarthi Narasimha Rao","doi":"10.1007/s10586-024-04581-6","DOIUrl":"https://doi.org/10.1007/s10586-024-04581-6","url":null,"abstract":"<p>Software-defined networking (SDN) is known for its enhanced network programmability and adaptability, but maintaining strong safety precautions to protect against emerging cyber-attacks remains a constant issue. Since SDN has logically centralized control, an attack on the controller might paralyze the entire network. For this reason, intrusion detection is very crucial. Many academics have embraced state-of-the-art techniques to assess and identify these assaults. However, the majority of these approaches lack scalability and accuracy. Moreover, they had difficulties with restricted features, low efficiency, incorrect characteristics, and computing complexity. Therefore, to detect network vulnerabilities in SDN-based IoT networks, we developed a practical deep learning approach based on Res2Net and Elman Recurrent Neural Networks (ERNN) technique as a defense solution to detect security issues in SDN. This framework consists of multiple steps and starts by addressing the dataset’s class imbalance issue with a Data Augmentation Generative Adversarial Network (DAGAN). Next, the Res2net and Enhanced Honey Badger Algorithm (EHBA) are used to extract and select features. This lowers the computational expense and lessens the possibility that the model would be misled by unsuitable and negative characteristics. Finally, an ERNN-based technique is used to detect and classify the intrusions in SDN. After seeing the network assaults, a practical mitigation framework is implemented to mitigate the network attacks. Three SDN IoT-focused datasets, InSDN, IoT-23 and ToN-IoT, are used in an experimental investigation to analyze the proposed framework’s performance. The results of numerous trials show that the proposed method outperforms existing techniques regarding several constraints.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An effective multiclass skin cancer classification approach based on deep convolutional neural network 基于深度卷积神经网络的有效多类皮肤癌分类方法
Pub Date : 2024-06-17 DOI: 10.1007/s10586-024-04540-1
Essam H. Houssein, Doaa A. Abdelkareem, Gang Hu, Mohamed Abdel Hameed, Ibrahim A. Ibrahim, Mina Younan

Skin cancer is one of the most dangerous types of cancer due to its immediate appearance and the possibility of rapid spread. It arises from uncontrollably growing cells, rapidly dividing cells in one area of the body, invading other bodily tissues, and spreading throughout the body. Early detection helps prevent cancer progress from reaching critical levels, reducing the risk of complications and the need for more aggressive treatment options. Convolutional neural networks (CNNs) revolutionize skin cancer diagnosis by extracting intricate features from images, enabling an accurate classification of lesions. Their role extends to early detection, providing a powerful tool for dermatologists to identify abnormalities in their nascent stages, ultimately improving patient outcomes. This study proposes a novel deep convolutional neural network (DCNN) approach to classifying skin cancer lesions. The proposed DCNN model is evaluated using two unbalanced datasets, namely HAM10000 and ISIC-2019. The DCNN model is compared with other transfer learning models, including VGG16, VGG19, DenseNet121, DenseNet201, and MobileNetV2. Its performance is assessed using four widely used evaluation metrics: accuracy, recall, precision, F1-score, specificity, and AUC. The experimental results demonstrate that the proposed DCNN model outperforms other deep learning (DL) models that utilized these datasets. The proposed DCNN model achieved the highest accuracy with the HAM10000 and ISIC-2019 datasets, reaching (98.5%) and (97.1%), respectively. These experimental results show how competitive and successful the DCNN model is in overcoming the problems caused by class imbalance and raising skin cancer classification accuracy. Furthermore, the proposed model demonstrates superior performance, particularly excelling in terms of accuracy, compared to other recent studies that utilize the same datasets, which highlights the robustness and effectiveness of the proposed DCNN.

皮肤癌是最危险的癌症之一,因为它可以立即出现并迅速扩散。它源于无法控制的细胞生长,细胞在身体的一个部位迅速分裂,侵入其他身体组织,并扩散到全身。早期检测有助于防止癌症发展到临界水平,降低并发症的风险,并减少对更积极治疗方案的需求。卷积神经网络(CNN)能从图像中提取复杂的特征,对病变进行准确分类,从而彻底改变皮肤癌的诊断方法。卷积神经网络的作用延伸到早期检测,为皮肤科医生提供了一个强大的工具,可在异常现象的萌芽阶段对其进行识别,最终改善患者的预后。本研究提出了一种新颖的深度卷积神经网络(DCNN)方法来对皮肤癌病变进行分类。使用两个非平衡数据集(即 HAM10000 和 ISIC-2019)对所提出的 DCNN 模型进行了评估。DCNN 模型与其他迁移学习模型进行了比较,包括 VGG16、VGG19、DenseNet121、DenseNet201 和 MobileNetV2。其性能使用四个广泛使用的评估指标进行评估:准确率、召回率、精确度、F1-分数、特异性和 AUC。实验结果表明,所提出的 DCNN 模型优于使用这些数据集的其他深度学习(DL)模型。所提出的DCNN模型在HAM10000和ISIC-2019数据集上取得了最高的准确率,分别达到了98.5%和97.1%。这些实验结果表明,DCNN 模型在克服类不平衡问题和提高皮肤癌分类准确率方面是多么有竞争力和成功。此外,与近期利用相同数据集进行的其他研究相比,所提出的模型表现出更优越的性能,尤其是在准确率方面,这凸显了所提出的 DCNN 的鲁棒性和有效性。
{"title":"An effective multiclass skin cancer classification approach based on deep convolutional neural network","authors":"Essam H. Houssein, Doaa A. Abdelkareem, Gang Hu, Mohamed Abdel Hameed, Ibrahim A. Ibrahim, Mina Younan","doi":"10.1007/s10586-024-04540-1","DOIUrl":"https://doi.org/10.1007/s10586-024-04540-1","url":null,"abstract":"<p>Skin cancer is one of the most dangerous types of cancer due to its immediate appearance and the possibility of rapid spread. It arises from uncontrollably growing cells, rapidly dividing cells in one area of the body, invading other bodily tissues, and spreading throughout the body. Early detection helps prevent cancer progress from reaching critical levels, reducing the risk of complications and the need for more aggressive treatment options. Convolutional neural networks (CNNs) revolutionize skin cancer diagnosis by extracting intricate features from images, enabling an accurate classification of lesions. Their role extends to early detection, providing a powerful tool for dermatologists to identify abnormalities in their nascent stages, ultimately improving patient outcomes. This study proposes a novel deep convolutional neural network (DCNN) approach to classifying skin cancer lesions. The proposed DCNN model is evaluated using two unbalanced datasets, namely HAM10000 and ISIC-2019. The DCNN model is compared with other transfer learning models, including VGG16, VGG19, DenseNet121, DenseNet201, and MobileNetV2. Its performance is assessed using four widely used evaluation metrics: accuracy, recall, precision, F1-score, specificity, and AUC. The experimental results demonstrate that the proposed DCNN model outperforms other deep learning (DL) models that utilized these datasets. The proposed DCNN model achieved the highest accuracy with the HAM10000 and ISIC-2019 datasets, reaching <span>(98.5%)</span> and <span>(97.1%)</span>, respectively. These experimental results show how competitive and successful the DCNN model is in overcoming the problems caused by class imbalance and raising skin cancer classification accuracy. Furthermore, the proposed model demonstrates superior performance, particularly excelling in terms of accuracy, compared to other recent studies that utilize the same datasets, which highlights the robustness and effectiveness of the proposed DCNN.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient buildings with energy-efficient optimized models: a case study on thermal bridge detection 采用节能优化模型的节能建筑:热桥检测案例研究
Pub Date : 2024-06-17 DOI: 10.1007/s10586-024-04624-y
Alparslan Fişne, M. Mücahit Enes Yurtsever, Süleyman Eken

Thermographic inspection is particularly effective in identifying thermal bridges because it visualizes temperature differences on the building’s surface. The focus of this work is on energy-efficient computing for deep learning-based thermal bridge (anomaly) detection models. In this study, we concentrate on object detection-based models such as Mask R-CNN_FPN_50, Swin-T Transformer, and FSAF. We do benchmark tests on TBRR dataset with varying input sizes. To overcome the energy-efficient design, we apply optimizations such as compression, latency reduction, and pruning to these models. After our proposed improvements, the inference of the anomaly detection model, Mask R-CNN_FPN_50 with compression technique, is approximately 7.5% faster than the original. Also, more acceleration is observed in all models with increasing input size. Another criterion we focus on is total energy gain for optimized models. Swin-T transformer has the most inference energy gains for all input sizes ((approx)27 J for 3000 x 4000 and (approx)14 J for 2400 x 3400). In conclusion, our study presents an optimization of size, weight, and power for vision-based anomaly detection for buildings.

热成像检测在识别热桥方面尤为有效,因为它可以直观地显示建筑物表面的温差。这项工作的重点是基于深度学习的热桥(异常)检测模型的节能计算。在这项研究中,我们主要关注基于物体检测的模型,如 Mask R-CNN_FPN_50、Swin-T Transformer 和 FSAF。我们在不同输入大小的 TBRR 数据集上进行了基准测试。为了克服高能效设计,我们对这些模型进行了压缩、减少延迟和剪枝等优化。经过我们提出的改进后,采用压缩技术的异常检测模型 Mask R-CNN_FPN_50 的推理速度比原来快了约 7.5%。此外,随着输入大小的增加,所有模型的推理速度都有所加快。我们关注的另一个标准是优化模型的总能量增益。在所有输入尺寸下,Swin-T 变压器的推理能量增益最大(3000 x 4000 时为 27 J,2400 x 3400 时为 14 J)。总之,我们的研究提出了基于视觉的建筑物异常检测的尺寸、重量和功率优化方案。
{"title":"Energy-efficient buildings with energy-efficient optimized models: a case study on thermal bridge detection","authors":"Alparslan Fişne, M. Mücahit Enes Yurtsever, Süleyman Eken","doi":"10.1007/s10586-024-04624-y","DOIUrl":"https://doi.org/10.1007/s10586-024-04624-y","url":null,"abstract":"<p>Thermographic inspection is particularly effective in identifying thermal bridges because it visualizes temperature differences on the building’s surface. The focus of this work is on energy-efficient computing for deep learning-based thermal bridge (anomaly) detection models. In this study, we concentrate on object detection-based models such as Mask R-CNN_FPN_50, Swin-T Transformer, and FSAF. We do benchmark tests on TBRR dataset with varying input sizes. To overcome the energy-efficient design, we apply optimizations such as compression, latency reduction, and pruning to these models. After our proposed improvements, the inference of the anomaly detection model, Mask R-CNN_FPN_50 with compression technique, is approximately 7.5% faster than the original. Also, more acceleration is observed in all models with increasing input size. Another criterion we focus on is total energy gain for optimized models. Swin-T transformer has the most inference energy gains for all input sizes (<span>(approx)</span>27 J for 3000 x 4000 and <span>(approx)</span>14 J for 2400 x 3400). In conclusion, our study presents an optimization of size, weight, and power for vision-based anomaly detection for buildings.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eel and grouper optimizer: a nature-inspired optimization algorithm 鳗鱼和石斑鱼优化器:受自然启发的优化算法
Pub Date : 2024-06-17 DOI: 10.1007/s10586-024-04545-w
Ali Mohammadzadeh, Seyedali Mirjalili

This paper proposes a meta-heuristic called Eel and Grouper Optimizer (EGO). The EGO algorithm is inspired by the symbiotic interaction and foraging strategy of eels and groupers in marine ecosystems. The algorithm’s efficacy is demonstrated through rigorous evaluation using nineteen benchmark functions, showcasing its superior performance compared to established meta-heuristic algorithms. The findings and results on the benchmark functions demonstrate that the EGO algorithm outperforms well-known meta-heuristics. This work also considers solving a wide range of real-world practical engineering case studies including tension/compression spring, pressure vessel, piston lever, and car side impact, and the CEC 2020 Real-World Benchmark using EGO to illustrate the practicality of the proposed algorithm when dealing with the challenges of real search spaces with unknown global optima. The results show that the proposed EGO algorithm is a reliable soft computing technique for real-world optimization problems and can efficiently outperform the existing algorithms in the literature.

本文提出了一种名为鳗鱼和石斑鱼优化器(EGO)的元启发式算法。EGO 算法的灵感来源于鳗鱼和石斑鱼在海洋生态系统中的共生互动和觅食策略。通过使用 19 个基准函数进行严格评估,该算法的功效得到了证明,与已有的元启发式算法相比,其性能更加优越。对基准函数的发现和结果表明,EGO 算法优于著名的元启发式算法。本研究还考虑使用 EGO 解决各种实际工程案例研究,包括拉伸/压缩弹簧、压力容器、活塞杆和汽车侧面撞击,以及 CEC 2020 真实世界基准,以说明所提算法在应对具有未知全局最优的真实搜索空间的挑战时的实用性。结果表明,所提出的 EGO 算法是一种可靠的软计算技术,适用于现实世界的优化问题,并能有效地超越文献中的现有算法。
{"title":"Eel and grouper optimizer: a nature-inspired optimization algorithm","authors":"Ali Mohammadzadeh, Seyedali Mirjalili","doi":"10.1007/s10586-024-04545-w","DOIUrl":"https://doi.org/10.1007/s10586-024-04545-w","url":null,"abstract":"<p>This paper proposes a meta-heuristic called Eel and Grouper Optimizer (EGO). The EGO algorithm is inspired by the symbiotic interaction and foraging strategy of eels and groupers in marine ecosystems. The algorithm’s efficacy is demonstrated through rigorous evaluation using nineteen benchmark functions, showcasing its superior performance compared to established meta-heuristic algorithms. The findings and results on the benchmark functions demonstrate that the EGO algorithm outperforms well-known meta-heuristics. This work also considers solving a wide range of real-world practical engineering case studies including tension/compression spring, pressure vessel, piston lever, and car side impact, and the CEC 2020 Real-World Benchmark using EGO to illustrate the practicality of the proposed algorithm when dealing with the challenges of real search spaces with unknown global optima. The results show that the proposed EGO algorithm is a reliable soft computing technique for real-world optimization problems and can efficiently outperform the existing algorithms in the literature.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved density peaks clustering algorithm using similarity assignment strategy with K-nearest neighbors 使用 K 近邻相似性分配策略的改进型密度峰聚类算法
Pub Date : 2024-06-16 DOI: 10.1007/s10586-024-04592-3
Wei Hu, Ji Feng, Degang Yang

Some particular shaped datasets, such as manifold datasets, have restrictions on density peak clustering (DPC) performance. The main reason of variations in sample densities between clusters of data and uneven densities is not taken into consideration by the DPC algorithm, which could result in the wrong clustering center selection. Additionally, the use of single assignment method is leads to the domino effect of assignment errors. To address these problems, this paper creates a new, improved density peaks clustering method use the similarity assignment strategy with K nearest Neighbors (IDPC-SKNN). Firstly, a new method for defining local density is proposed. Local density is comprehensively consider in the proportion of the average density inside the region, which realize the precise location of low-density clusters. Then, using the samples’ K-nearest neighbors information, a new similarity allocation method is proposed. Allocation strategy successfully address assignment cascading mistakes and improves algorithms robustness. Finally, based on four evaluation indicators, our algorithm outperforms all the comparative clustering algorithm, according to experiments conducted on synthetic, real world and the Olivetti Faces datasets.

一些特殊形状的数据集(如流形数据集)对密度峰聚类(DPC)性能有限制。主要原因是数据簇之间样本密度的变化和密度不均没有被 DPC 算法考虑在内,这可能会导致聚类中心选择错误。此外,使用单一赋值方法会导致赋值错误的多米诺骨牌效应。为了解决这些问题,本文使用 K 最近邻的相似性赋值策略(IDPC-SKNN)创建了一种新的、改进的密度峰聚类方法。首先,本文提出了一种定义局部密度的新方法。局部密度综合考虑了区域内平均密度的比例,实现了低密度聚类的精确定位。然后,利用样本的 K 近邻信息,提出了一种新的相似性分配方法。分配策略成功地解决了分配级联错误,提高了算法的鲁棒性。最后,根据在合成、真实世界和 Olivetti Faces 数据集上进行的实验,基于四个评价指标,我们的算法优于所有比较聚类算法。
{"title":"An improved density peaks clustering algorithm using similarity assignment strategy with K-nearest neighbors","authors":"Wei Hu, Ji Feng, Degang Yang","doi":"10.1007/s10586-024-04592-3","DOIUrl":"https://doi.org/10.1007/s10586-024-04592-3","url":null,"abstract":"<p>Some particular shaped datasets, such as manifold datasets, have restrictions on density peak clustering (DPC) performance. The main reason of variations in sample densities between clusters of data and uneven densities is not taken into consideration by the DPC algorithm, which could result in the wrong clustering center selection. Additionally, the use of single assignment method is leads to the domino effect of assignment errors. To address these problems, this paper creates a new, improved density peaks clustering method use the similarity assignment strategy with K nearest Neighbors (IDPC-SKNN). Firstly, a new method for defining local density is proposed. Local density is comprehensively consider in the proportion of the average density inside the region, which realize the precise location of low-density clusters. Then, using the samples’ K-nearest neighbors information, a new similarity allocation method is proposed. Allocation strategy successfully address assignment cascading mistakes and improves algorithms robustness. Finally, based on four evaluation indicators, our algorithm outperforms all the comparative clustering algorithm, according to experiments conducted on synthetic, real world and the Olivetti Faces datasets.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cluster Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1