首页 > 最新文献

Cluster Computing最新文献

英文 中文
A hybrid approach of ALNS with alternative initialization and acceptance mechanisms for capacitated vehicle routing problems 具有替代初始化和接受机制的 ALNS 混合方法,用于解决有容量的车辆路由问题
Pub Date : 2024-07-01 DOI: 10.1007/s10586-024-04643-9
Yiğit Çağatay Kuyu, Fahri Vatansever

The vehicle routing problem (VRP) with capacity constraints is a challenging problem that falls into the category of non-deterministic polynomial-time hard (NP-hard) problems. Finding an optimal solution to this problem is difficult as it involves numerous possible route combinations and constraints. The Adaptive Large Neighborhood Search (ALNS) has been widely employed to solve VRPs by searching for optimal solutions using a variety of dynamic destroy and repair operators, which gradually improve the initial solution. This study investigates six alternative initialization mechanisms and one distinct acceptance criterion for ALNS as the selection of an initial solution in ALNS is a crucial factor affecting the efficiency of the search for feasible regions. The process combines ALNS with the aforementioned procedures, resulting in a hybrid of seven methods. To evaluate the performance of the initialization mechanism and acceptance criterion in ALNS, 50 capacitated vehicle routing benchmark instances are employed. High-dimensional problems are also included for more comprehensive analysis. The improvement in the accuracy of the solutions achieved by each variant is reported.

具有容量约束的车辆路由问题(VRP)是一个具有挑战性的问题,属于非确定性多项式时间难(NP-hard)问题。由于该问题涉及众多可能的路线组合和约束条件,因此很难找到最优解。自适应大邻域搜索(ALNS)已被广泛用于解决 VRP,它通过使用各种动态破坏和修复算子来搜索最优解,从而逐步改善初始解。由于 ALNS 中初始解的选择是影响可行区域搜索效率的关键因素,因此本研究对 ALNS 的六种可选初始化机制和一种不同的接受准则进行了研究。该过程将 ALNS 与上述程序相结合,形成了七种方法的混合体。为了评估 ALNS 中初始化机制和接受标准的性能,采用了 50 个电容式车辆路由基准实例。为了进行更全面的分析,还加入了高维问题。报告了每种变体对解决方案准确性的提高。
{"title":"A hybrid approach of ALNS with alternative initialization and acceptance mechanisms for capacitated vehicle routing problems","authors":"Yiğit Çağatay Kuyu, Fahri Vatansever","doi":"10.1007/s10586-024-04643-9","DOIUrl":"https://doi.org/10.1007/s10586-024-04643-9","url":null,"abstract":"<p>The vehicle routing problem (VRP) with capacity constraints is a challenging problem that falls into the category of non-deterministic polynomial-time hard (NP-hard) problems. Finding an optimal solution to this problem is difficult as it involves numerous possible route combinations and constraints. The Adaptive Large Neighborhood Search (ALNS) has been widely employed to solve VRPs by searching for optimal solutions using a variety of dynamic destroy and repair operators, which gradually improve the initial solution. This study investigates six alternative initialization mechanisms and one distinct acceptance criterion for ALNS as the selection of an initial solution in ALNS is a crucial factor affecting the efficiency of the search for feasible regions. The process combines ALNS with the aforementioned procedures, resulting in a hybrid of seven methods. To evaluate the performance of the initialization mechanism and acceptance criterion in ALNS, 50 capacitated vehicle routing benchmark instances are employed. High-dimensional problems are also included for more comprehensive analysis. The improvement in the accuracy of the solutions achieved by each variant is reported.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on privacy-preserving federated learning against poisoning attacks 针对中毒攻击的隐私保护联合学习调查
Pub Date : 2024-07-01 DOI: 10.1007/s10586-024-04629-7
Feng Xia, Wenhao Cheng

Federated learning (FL) is designed to protect privacy of participants by not allowing direct access to the participants’ local datasets and training processes. This limitation hinders the server’s ability to verify the authenticity of the model updates sent by participants, making FL vulnerable to poisoning attacks. In addition, gradients in FL process can reveal private information about the local dataset of the participants. However, there is a contradiction between improving robustness against poisoning attacks and preserving privacy of participants. Privacy-preserving techniques aim to make their data indistinguishable from each other, which hinders the detection of abnormal data based on similarity. It is challenging to enhance both aspects simultaneously. The growing concern for data security and privacy protection has inspired us to undertake this research and compile this survey. In this survey, we investigate existing privacy-preserving defense strategies against poisoning attacks in FL. First, we introduce two important classifications of poisoning attacks: data poisoning attack and model poisoning attack. Second, we study plaintext-based defense strategies and classify them into two categories: poisoning tolerance and poisoning detection. Third, we investigate how the combination of privacy techniques and traditional detection strategies can be achieved to defend against poisoning attacks while protecting the privacy of the participants. Finally, we also discuss the challenges faced in the area of security and privacy.

联合学习(FL)旨在保护参与者的隐私,不允许直接访问参与者的本地数据集和训练过程。这一限制阻碍了服务器验证参与者发送的模型更新真实性的能力,从而使 FL 容易受到中毒攻击。此外,FL 过程中的梯度会泄露参与者本地数据集的私人信息。然而,提高对中毒攻击的鲁棒性与保护参与者隐私之间存在矛盾。保护隐私的技术旨在使数据彼此不可区分,这就阻碍了基于相似性的异常数据检测。要同时增强这两方面的能力是一项挑战。人们对数据安全和隐私保护的关注与日俱增,这促使我们开展这项研究,并编写了这份调查报告。在本调查中,我们研究了 FL 中现有的针对中毒攻击的隐私保护防御策略。首先,我们介绍了两种重要的中毒攻击分类:数据中毒攻击和模型中毒攻击。其次,我们研究了基于明文的防御策略,并将其分为两类:中毒容忍和中毒检测。第三,我们研究了如何将隐私技术和传统检测策略结合起来,在保护参与者隐私的同时防御中毒攻击。最后,我们还讨论了在安全和隐私领域面临的挑战。
{"title":"A survey on privacy-preserving federated learning against poisoning attacks","authors":"Feng Xia, Wenhao Cheng","doi":"10.1007/s10586-024-04629-7","DOIUrl":"https://doi.org/10.1007/s10586-024-04629-7","url":null,"abstract":"<p>Federated learning (FL) is designed to protect privacy of participants by not allowing direct access to the participants’ local datasets and training processes. This limitation hinders the server’s ability to verify the authenticity of the model updates sent by participants, making FL vulnerable to poisoning attacks. In addition, gradients in FL process can reveal private information about the local dataset of the participants. However, there is a contradiction between improving robustness against poisoning attacks and preserving privacy of participants. Privacy-preserving techniques aim to make their data indistinguishable from each other, which hinders the detection of abnormal data based on similarity. It is challenging to enhance both aspects simultaneously. The growing concern for data security and privacy protection has inspired us to undertake this research and compile this survey. In this survey, we investigate existing privacy-preserving defense strategies against poisoning attacks in FL. First, we introduce two important classifications of poisoning attacks: data poisoning attack and model poisoning attack. Second, we study plaintext-based defense strategies and classify them into two categories: poisoning tolerance and poisoning detection. Third, we investigate how the combination of privacy techniques and traditional detection strategies can be achieved to defend against poisoning attacks while protecting the privacy of the participants. Finally, we also discuss the challenges faced in the area of security and privacy.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid deep learning based enhanced and reliable approach for VANET intrusion detection system 基于混合深度学习的 VANET 入侵检测系统的增强型可靠方法
Pub Date : 2024-07-01 DOI: 10.1007/s10586-024-04634-w
Atul Barve, Pushpinder Singh Patheja

Advances in autonomous transportation technologies have profoundly influenced the evolution of daily commuting and travel. These innovations rely heavily on seamless connectivity, facilitated by applications within intelligent transportation systems that make effective use of vehicular Ad- hoc Network (VANET) technology. However, the susceptibility of VANETs to malicious activities necessitates the implementation of robust security measures, notably intrusion detection systems (IDS). The article proposed a model for an IDS capable of collaboratively collecting network data from both vehicular nodes and Roadside Units (RSUs). The proposed IDS makes use of the VANET distributed denial of service dataset. Additionally, the proposed IDS uses a K-means clustering method to find clear groups in the simulated VANET architecture. To mitigate the risk of model overfitting, we meticulously curated test data, ensuring its divergence from the training set. Consequently, a hybrid deep learning approach is proposed by integrating Convolutional Neural Networks (CNN) and Bidirectional Long Short-Term Memory (BiLSTM) networks. which results in the highest training, testing, and validation accuracy of 99.56, 99.49, and 99.65% respectively. The results of the proposed methodology is compared with the existing state-of-the-art in the same domain, the accuracy of the proposed method is raised by maximum of 4.65% and minimum by 0.20%.

自主交通技术的进步对日常通勤和旅行的发展产生了深远影响。这些创新在很大程度上依赖于无缝连接,而智能交通系统内的应用则有效利用了车载 Ad- hoc 网络(VANET)技术。然而,由于 VANET 易受恶意活动的影响,因此有必要实施强有力的安全措施,特别是入侵检测系统 (IDS)。文章提出了一种 IDS 模型,该模型能够协同收集来自车辆节点和路边装置(RSU)的网络数据。拟议的 IDS 利用了 VANET 分布式拒绝服务数据集。此外,拟议的 IDS 还使用 K-means 聚类方法在模拟的 VANET 架构中找到清晰的组。为了降低模型过拟合的风险,我们对测试数据进行了精心策划,确保其与训练集的差异。因此,通过整合卷积神经网络(CNN)和双向长短期记忆(BiLSTM)网络,我们提出了一种混合深度学习方法,其最高训练、测试和验证准确率分别为 99.56%、99.49% 和 99.65%。将所提方法的结果与同一领域现有的最先进方法进行比较,发现所提方法的准确率最高提高了 4.65%,最低提高了 0.20%。
{"title":"A hybrid deep learning based enhanced and reliable approach for VANET intrusion detection system","authors":"Atul Barve, Pushpinder Singh Patheja","doi":"10.1007/s10586-024-04634-w","DOIUrl":"https://doi.org/10.1007/s10586-024-04634-w","url":null,"abstract":"<p>Advances in autonomous transportation technologies have profoundly influenced the evolution of daily commuting and travel. These innovations rely heavily on seamless connectivity, facilitated by applications within intelligent transportation systems that make effective use of vehicular Ad- hoc Network (VANET) technology. However, the susceptibility of VANETs to malicious activities necessitates the implementation of robust security measures, notably intrusion detection systems (IDS). The article proposed a model for an IDS capable of collaboratively collecting network data from both vehicular nodes and Roadside Units (RSUs). The proposed IDS makes use of the VANET distributed denial of service dataset. Additionally, the proposed IDS uses a K-means clustering method to find clear groups in the simulated VANET architecture. To mitigate the risk of model overfitting, we meticulously curated test data, ensuring its divergence from the training set. Consequently, a hybrid deep learning approach is proposed by integrating Convolutional Neural Networks (CNN) and Bidirectional Long Short-Term Memory (BiLSTM) networks. which results in the highest training, testing, and validation accuracy of 99.56, 99.49, and 99.65% respectively. The results of the proposed methodology is compared with the existing state-of-the-art in the same domain, the accuracy of the proposed method is raised by maximum of 4.65% and minimum by 0.20%.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved scheduling with advantage actor-critic for Storm workloads 针对风暴工作负载的优势演员评判器改进调度方法
Pub Date : 2024-06-29 DOI: 10.1007/s10586-024-04640-y
Gaoqiang Dong, Jia Wang, Mingjing Wang, Tingting Su

Various resources as the essential elements of data centers, and their utilization is vital to resource managers. In terms of the persistence, the periodicity and the spatial-temporal dependence of stream workload, a new Storm scheduler with Advantage Actor-Critic is proposed to improve resource utilization for minimizing the completion time. A new weighted embedding with a Graph Neural Network is designed to depend on the features of a job comprehensively, which includes the dependence, the types and the positions of tasks in a job. An improved Advantage Actor-Critic integrating task chosen and executor assignment is proposed to schedule tasks to executors in order to better resource utilization. Then the status of tasks and executors are updated for the next scheduling. Compared to existing methods, experimental results show that the proposed Storm scheduler improves resource utilization. The completion time is reduced by almost 17% on the TPC-H data set and reduced by almost 25% on the Alibaba data set.

各种资源作为数据中心的基本要素,其利用率对资源管理者至关重要。针对流工作负载的持久性、周期性和时空依赖性,提出了一种新的风暴调度器(Storm scheduler),该调度器具有优势行动者批判(Advantage Actor-Critic),可提高资源利用率,最大限度地缩短完成时间。设计了一种新的图形神经网络加权嵌入,以全面依赖于作业的特征,包括作业中任务的依赖性、类型和位置。为了更好地利用资源,提出了一种集成了任务选择和执行者分配的改进型优势行动者批判器,用于向执行者调度任务。然后更新任务和执行者的状态,以便进行下一次调度。与现有方法相比,实验结果表明所提出的 Storm 调度器提高了资源利用率。在 TPC-H 数据集上,完成时间缩短了近 17%,在阿里巴巴数据集上,完成时间缩短了近 25%。
{"title":"An improved scheduling with advantage actor-critic for Storm workloads","authors":"Gaoqiang Dong, Jia Wang, Mingjing Wang, Tingting Su","doi":"10.1007/s10586-024-04640-y","DOIUrl":"https://doi.org/10.1007/s10586-024-04640-y","url":null,"abstract":"<p>Various resources as the essential elements of data centers, and their utilization is vital to resource managers. In terms of the persistence, the periodicity and the spatial-temporal dependence of stream workload, a new Storm scheduler with Advantage Actor-Critic is proposed to improve resource utilization for minimizing the completion time. A new weighted embedding with a Graph Neural Network is designed to depend on the features of a job comprehensively, which includes the dependence, the types and the positions of tasks in a job. An improved Advantage Actor-Critic integrating task chosen and executor assignment is proposed to schedule tasks to executors in order to better resource utilization. Then the status of tasks and executors are updated for the next scheduling. Compared to existing methods, experimental results show that the proposed Storm scheduler improves resource utilization. The completion time is reduced by almost 17% on the TPC-H data set and reduced by almost 25% on the Alibaba data set.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
File chunking towards on-chain storage: a blockchain-based data preservation framework 实现链上存储的文件分块:基于区块链的数据保存框架
Pub Date : 2024-06-29 DOI: 10.1007/s10586-024-04646-6
Muhammed Tmeizeh, Carlos Rodríguez-Domínguez, María Visitación Hurtado-Torres

The growing popularity of the most current wave of decentralized systems, powered by blockchain technology, which act as data vaults and preserve data, ensures that, once stored, it stays preserved, considered to be one of the most promising safe and immutable storage methods. The authors of this research suggest an on-chain storage framework that stores files inside blockchain transactions using file transforming, chunking, and encoding techniques. This study investigates the performance of on-chain file storage using a simulated network blockchain environment. Test files of varying sizes were deployed. Performance metrics, including consumed time in chunking, encoding, and distributing chunks among block transactions, were measured and analyzed. An analysis of the collected data was conducted to assess the framework’s performance. The result showed that selecting the appropriate chunk size significantly influences the overall performance of the system. We also explored the implications of our findings and offered suggestions for improving performance within the framework.

当前,以区块链技术为动力的去中心化系统浪潮日益流行,这些系统充当数据保险库并保存数据,确保数据一旦存储,就能一直保存,被认为是最有前途的安全、不可变的存储方法之一。本研究的作者提出了一种链上存储框架,利用文件转换、分块和编码技术将文件存储在区块链交易中。本研究使用模拟网络区块链环境研究了链上文件存储的性能。我们部署了不同大小的测试文件。对性能指标进行了测量和分析,包括分块、编码和在区块交易中分配块所消耗的时间。对收集到的数据进行了分析,以评估框架的性能。结果表明,选择适当的分块大小对系统的整体性能有很大影响。我们还探讨了研究结果的意义,并提出了改进框架性能的建议。
{"title":"File chunking towards on-chain storage: a blockchain-based data preservation framework","authors":"Muhammed Tmeizeh, Carlos Rodríguez-Domínguez, María Visitación Hurtado-Torres","doi":"10.1007/s10586-024-04646-6","DOIUrl":"https://doi.org/10.1007/s10586-024-04646-6","url":null,"abstract":"<p>The growing popularity of the most current wave of decentralized systems, powered by blockchain technology, which act as data vaults and preserve data, ensures that, once stored, it stays preserved, considered to be one of the most promising safe and immutable storage methods. The authors of this research suggest an on-chain storage framework that stores files inside blockchain transactions using file transforming, chunking, and encoding techniques. This study investigates the performance of on-chain file storage using a simulated network blockchain environment. Test files of varying sizes were deployed. Performance metrics, including consumed time in chunking, encoding, and distributing chunks among block transactions, were measured and analyzed. An analysis of the collected data was conducted to assess the framework’s performance. The result showed that selecting the appropriate chunk size significantly influences the overall performance of the system. We also explored the implications of our findings and offered suggestions for improving performance within the framework.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing security and scalability by AI/ML workload optimization in the cloud 通过优化云中的人工智能/ML 工作负载,提高安全性和可扩展性
Pub Date : 2024-06-28 DOI: 10.1007/s10586-024-04641-x
Sabina Priyadarshini, Tukaram Namdev Sawant, Gitanjali Bhimrao Yadav, J. Premalatha, Sanjay R. Pawar

The pervasive adoption of Artificial Intelligence (AI) and Machine Learning (ML) applications has exponentially increased the demand for efficient resource allocation, workload scheduling, and parallel computing capabilities in cloud environments. This research addresses the critical need for enhancing both the scalability and security of AI/ML workloads in cloud computing settings. The study emphasizes the optimization of resource allocation strategies to accommodate the diverse requirements of AI/ML workloads. Efficient resource allocation ensures that computational resources are utilized judiciously, avoiding bottlenecks and latency issues that could hinder the performance of AI/ML applications. The research explores advanced parallel computing techniques to harness the full possible cloud infrastructure, enhancing the speed and efficiency of AI/ML computations. The integration of robust security measures is crucial to safeguard sensitive data and models processed in the cloud. The research delves into secure multi-party computation and encryption techniques like the Hybrid Heft Pso Ga algorithm, Heuristic Function for Adaptive Batch Stream Scheduling Module (ABSS) and allocation of resources parallel computing and Kuhn–Munkres algorithm tailored for AI/ML workloads, ensuring confidentiality and integrity throughout the computation lifecycle. To validate the proposed methodologies, the research employs extensive simulations and real-world experiments. The proposed ABSS_SSMM method achieves the highest accuracy and throughput values of 98% and 94%, respectively. The contributions of this research extend to the broader cloud computing and AI/ML communities. By providing scalable and secure solutions, the study aims to empower cloud service providers, enterprises, and researchers to leverage AI/ML technologies with confidence. The findings are anticipated to inform the design and implementation of next-generation cloud platforms that seamlessly support the evolving landscape of AI/ML applications, fostering innovation and driving the adoption of intelligent technologies in diverse domains.

人工智能(AI)和机器学习(ML)应用的普及,使云计算环境中对高效资源分配、工作负载调度和并行计算能力的需求呈指数级增长。本研究解决了在云计算环境中提高人工智能/ML 工作负载的可扩展性和安全性的关键需求。研究强调优化资源分配策略,以适应人工智能/ML 工作负载的不同要求。高效的资源分配可确保计算资源得到合理利用,避免出现瓶颈和延迟问题,这些问题可能会阻碍人工智能/ML 应用程序的性能。研究探索了先进的并行计算技术,以充分利用可能的云基础设施,提高人工智能/移动计算的速度和效率。整合强大的安全措施对于保护云中处理的敏感数据和模型至关重要。研究深入探讨了安全的多方计算和加密技术,如混合 Heft Pso Ga 算法、自适应批量流调度模块(ABSS)的启发式函数、资源分配并行计算以及为 AI/ML 工作负载量身定制的 Kuhn-Munkres 算法,以确保整个计算生命周期的机密性和完整性。为了验证所提出的方法,研究采用了大量模拟和实际实验。所提出的 ABSS_SSMM 方法达到了最高的准确率和吞吐量,分别为 98% 和 94%。这项研究的贡献延伸到了更广泛的云计算和人工智能/人工智能社区。通过提供可扩展的安全解决方案,本研究旨在增强云服务提供商、企业和研究人员利用人工智能/移动语言技术的信心。预计研究结果将为下一代云平台的设计和实施提供参考,这些平台可无缝支持不断发展的人工智能/ML 应用,促进创新并推动智能技术在不同领域的应用。
{"title":"Enhancing security and scalability by AI/ML workload optimization in the cloud","authors":"Sabina Priyadarshini, Tukaram Namdev Sawant, Gitanjali Bhimrao Yadav, J. Premalatha, Sanjay R. Pawar","doi":"10.1007/s10586-024-04641-x","DOIUrl":"https://doi.org/10.1007/s10586-024-04641-x","url":null,"abstract":"<p>The pervasive adoption of Artificial Intelligence (AI) and Machine Learning (ML) applications has exponentially increased the demand for efficient resource allocation, workload scheduling, and parallel computing capabilities in cloud environments. This research addresses the critical need for enhancing both the scalability and security of AI/ML workloads in cloud computing settings. The study emphasizes the optimization of resource allocation strategies to accommodate the diverse requirements of AI/ML workloads. Efficient resource allocation ensures that computational resources are utilized judiciously, avoiding bottlenecks and latency issues that could hinder the performance of AI/ML applications. The research explores advanced parallel computing techniques to harness the full possible cloud infrastructure, enhancing the speed and efficiency of AI/ML computations. The integration of robust security measures is crucial to safeguard sensitive data and models processed in the cloud. The research delves into secure multi-party computation and encryption techniques like the Hybrid Heft Pso Ga algorithm, Heuristic Function for Adaptive Batch Stream Scheduling Module (ABSS) and allocation of resources parallel computing and Kuhn–Munkres algorithm tailored for AI/ML workloads, ensuring confidentiality and integrity throughout the computation lifecycle. To validate the proposed methodologies, the research employs extensive simulations and real-world experiments. The proposed ABSS_SSMM method achieves the highest accuracy and throughput values of 98% and 94%, respectively. The contributions of this research extend to the broader cloud computing and AI/ML communities. By providing scalable and secure solutions, the study aims to empower cloud service providers, enterprises, and researchers to leverage AI/ML technologies with confidence. The findings are anticipated to inform the design and implementation of next-generation cloud platforms that seamlessly support the evolving landscape of AI/ML applications, fostering innovation and driving the adoption of intelligent technologies in diverse domains.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141531734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A weighted multi-view clustering via sparse graph learning 通过稀疏图学习进行加权多视角聚类
Pub Date : 2024-06-28 DOI: 10.1007/s10586-024-04636-8
Jie Zhou, Runxin Zhang

Multi-view clustering considers the diversity of different views and fuses these views to produce a more accurate and robust partition than single-view clustering. It is a key problem of multi-view clustering research to allocate each view reasonably based on its contribution value. In this paper, we propose a weighted multi-view clustering model via sparse graph learning to cope with allocation of different views. The proposed idea is to assign different view weights instead of equal view weights to learn a high-quality shared similarity matrix for multi-view clustering. In our new proposed method, it can consider the clustering capacity heterogeneity of different views in fusion by assigning a weight for each view so that each view special feature are fully excavated, and improve the performance of multi-view clustering. Moreover, our proposed method can directly obtained cluster indicators by imposing low rank constraints without any post-processing operations. In addition, our model is proposed based on sparse graph, so that the outliers and noise in each view data are well handled and the robustness of the algorithm is effectively guaranteed. Finally, numerous experimental results are conducted on different sizes benchmark datasets, and show that the performance of our algorithm is quite satisfactory. The code of our proposed method is publicly available at https://github.com/zhoujie05/A-weighted-multi-view-clustering-via-sparse-graph-learning.

多视图聚类考虑了不同视图的多样性,并将这些视图融合在一起,从而产生比单视图聚类更准确、更稳健的分区。如何根据每个视图的贡献值对其进行合理分配,是多视图聚类研究的一个关键问题。本文提出了一种通过稀疏图学习的加权多视图聚类模型,以应对不同视图的分配问题。我们提出的想法是分配不同的视图权重而不是相等的视图权重,以学习高质量的共享相似性矩阵来进行多视图聚类。在我们提出的新方法中,通过为每个视图分配一个权重,可以考虑融合中不同视图的聚类能力异质性,从而充分挖掘每个视图的特殊特征,提高多视图聚类的性能。此外,我们提出的方法可以通过施加低等级约束直接获得聚类指标,无需任何后处理操作。此外,我们还提出了基于稀疏图的模型,从而很好地处理了各视图数据中的异常值和噪声,有效保证了算法的鲁棒性。最后,我们在不同规模的基准数据集上进行了大量实验,结果表明我们的算法性能相当令人满意。我们提出的方法的代码可在 https://github.com/zhoujie05/A-weighted-multi-view-clustering-via-sparse-graph-learning 上公开获取。
{"title":"A weighted multi-view clustering via sparse graph learning","authors":"Jie Zhou, Runxin Zhang","doi":"10.1007/s10586-024-04636-8","DOIUrl":"https://doi.org/10.1007/s10586-024-04636-8","url":null,"abstract":"<p>Multi-view clustering considers the diversity of different views and fuses these views to produce a more accurate and robust partition than single-view clustering. It is a key problem of multi-view clustering research to allocate each view reasonably based on its contribution value. In this paper, we propose a weighted multi-view clustering model via sparse graph learning to cope with allocation of different views. The proposed idea is to assign different view weights instead of equal view weights to learn a high-quality shared similarity matrix for multi-view clustering. In our new proposed method, it can consider the clustering capacity heterogeneity of different views in fusion by assigning a weight for each view so that each view special feature are fully excavated, and improve the performance of multi-view clustering. Moreover, our proposed method can directly obtained cluster indicators by imposing low rank constraints without any post-processing operations. In addition, our model is proposed based on sparse graph, so that the outliers and noise in each view data are well handled and the robustness of the algorithm is effectively guaranteed. Finally, numerous experimental results are conducted on different sizes benchmark datasets, and show that the performance of our algorithm is quite satisfactory. The code of our proposed method is publicly available at https://github.com/zhoujie05/A-weighted-multi-view-clustering-via-sparse-graph-learning.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MTV-SCA: multi-trial vector-based sine cosine algorithm MTV-SCA:基于多试验向量的正余弦算法
Pub Date : 2024-06-28 DOI: 10.1007/s10586-024-04602-4
Mohammad H. Nadimi-Shahraki, Shokooh Taghian, Danial Javaheri, Ali Safaa Sadiq, Nima Khodadadi, Seyedali Mirjalili

The sine cosine algorithm (SCA) is a metaheuristic algorithm that employs the characteristics of sine and cosine trigonometric functions. SCA’s deficiencies include a tendency to get trapped in local optima, exploration–exploitation imbalance, and poor accuracy, which limit its effectiveness in solving complex optimization problems. To address these limitations, a multi-trial vector-based sine cosine algorithm (MTV-SCA) is proposed in this study. In MTV-SCA, a sufficient number of search strategies incorporating three control parameters are adapted through a multi-trial vector (MTV) approach to achieve specific objectives during the search process. The major contribution of this study is employing four distinct search strategies, each adapted to preserve the equilibrium between exploration and exploitation and avoid premature convergence during optimization. The strategies utilize different sinusoidal and cosinusoidal parameters to improve the algorithm’s performance. The effectiveness of MTV-SCA was evaluated using benchmark functions of CEC 2018 and compared to state-of-the-art, well-established, CEC 2017 winner algorithms and recent optimization algorithms. The results demonstrate that the MTV-SCA outperforms the traditional SCA and other optimization algorithms in terms of convergence speed, accuracy, and the capability to avoid premature convergence. Moreover, the Friedman and Wilcoxon signed-rank tests were employed to statistically analyze the experimental results, validating that the MTV-SCA significantly surpasses other comparative algorithms. The real-world applicability of this algorithm is also demonstrated by optimizing six non-convex constrained optimization problems in engineering design. The experimental results indicate that MTV-SCA can effectively handle complex optimization challenges.

正弦余弦算法(SCA)是一种利用正弦和余弦三角函数特性的元启发式算法。正余弦算法的不足之处包括容易陷入局部最优、探索-开发不平衡以及准确性差,这些都限制了其解决复杂优化问题的有效性。针对这些不足,本研究提出了一种基于多试验向量的正余弦算法(MTV-SCA)。在 MTV-SCA 中,通过多试验向量 (MTV) 方法调整了包含三个控制参数的足够数量的搜索策略,以在搜索过程中实现特定目标。本研究的主要贡献在于采用了四种不同的搜索策略,每种策略都能保持探索与开发之间的平衡,避免在优化过程中过早收敛。这些策略利用不同的正弦和余弦参数来提高算法的性能。利用 CEC 2018 的基准函数评估了 MTV-SCA 的有效性,并将其与最先进的、成熟的、CEC 2017 获奖算法和最新优化算法进行了比较。结果表明,MTV-SCA 在收敛速度、准确性和避免过早收敛的能力方面都优于传统 SCA 和其他优化算法。此外,弗里德曼检验和威尔科克森符号秩检验对实验结果进行了统计分析,验证了 MTV-SCA 明显优于其他比较算法。通过优化工程设计中的六个非凸约束优化问题,也证明了该算法在现实世界中的适用性。实验结果表明,MTV-SCA 可以有效地应对复杂的优化挑战。
{"title":"MTV-SCA: multi-trial vector-based sine cosine algorithm","authors":"Mohammad H. Nadimi-Shahraki, Shokooh Taghian, Danial Javaheri, Ali Safaa Sadiq, Nima Khodadadi, Seyedali Mirjalili","doi":"10.1007/s10586-024-04602-4","DOIUrl":"https://doi.org/10.1007/s10586-024-04602-4","url":null,"abstract":"<p>The sine cosine algorithm (SCA) is a metaheuristic algorithm that employs the characteristics of sine and cosine trigonometric functions. SCA’s deficiencies include a tendency to get trapped in local optima, exploration–exploitation imbalance, and poor accuracy, which limit its effectiveness in solving complex optimization problems. To address these limitations, a multi-trial vector-based sine cosine algorithm (MTV-SCA) is proposed in this study. In MTV-SCA, a sufficient number of search strategies incorporating three control parameters are adapted through a multi-trial vector (MTV) approach to achieve specific objectives during the search process. The major contribution of this study is employing four distinct search strategies, each adapted to preserve the equilibrium between exploration and exploitation and avoid premature convergence during optimization. The strategies utilize different sinusoidal and cosinusoidal parameters to improve the algorithm’s performance. The effectiveness of MTV-SCA was evaluated using benchmark functions of CEC 2018 and compared to state-of-the-art, well-established, CEC 2017 winner algorithms and recent optimization algorithms. The results demonstrate that the MTV-SCA outperforms the traditional SCA and other optimization algorithms in terms of convergence speed, accuracy, and the capability to avoid premature convergence. Moreover, the Friedman and Wilcoxon signed-rank tests were employed to statistically analyze the experimental results, validating that the MTV-SCA significantly surpasses other comparative algorithms. The real-world applicability of this algorithm is also demonstrated by optimizing six non-convex constrained optimization problems in engineering design. The experimental results indicate that MTV-SCA can effectively handle complex optimization challenges.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced cost-aware Max–Min workflow tasks allocation and scheduling in cloud computing systems 云计算系统中先进的成本感知最大最小工作流任务分配与调度
Pub Date : 2024-06-27 DOI: 10.1007/s10586-024-04594-1
Mostafa Raeisi-Varzaneh, Omar Dakkak, Yousef Fazea, Mohammed Golam Kaosar

Cloud computing has emerged as an efficient distribution platform in modern distributed computing offering scalability and flexibility. Task scheduling is considered as one of the main crucial aspects of cloud computing. The primary purpose of the task scheduling mechanism is to reduce the cost and makespan and determine which virtual machine (VM) needs to be selected to execute the task. It is widely acknowledged as a nondeterministic polynomial-time complete problem, necessitating the development of an efficient solution. This paper presents an innovative approach to task scheduling and allocation within cloud computing systems. Our focus lies on improving both the efficiency and cost-effectiveness of task execution, with a specific emphasis on optimizing makespan and resource utilization. This is achieved through the introduction of an Advanced Max–Min Algorithm, which builds upon traditional methodologies to significantly enhance performance metrics such as makespan, waiting time, and resource utilization. The selection of the Max–Min algorithm is rooted in its ability to strike a balance between task execution time and resource utilization, making it a suitable candidate for addressing the challenges of cloud task scheduling. Furthermore, a key contribution of this work is the integration of a cost-aware algorithm into the scheduling framework. This algorithm enables the effective management of task execution costs, ensuring alignment with user requirements while operating within the constraints of cloud service providers. The proposed method adjusts task allocation based on cost considerations dynamically. Additionally, the presented approach enhances the overall economic efficiency of cloud computing deployments. The findings demonstrate that the proposed Advanced Max–Min Algorithm outperforms the traditional Max–Min, Min–Min, and SJF algorithms with respect to makespan, waiting time, and resource utilization.

在现代分布式计算中,云计算已成为一种高效的分配平台,具有可扩展性和灵活性。任务调度被认为是云计算的主要关键方面之一。任务调度机制的主要目的是降低成本和时间跨度,并确定需要选择哪台虚拟机(VM)来执行任务。人们普遍认为这是一个非确定性多项式时间完整问题,因此有必要开发一种高效的解决方案。本文提出了一种在云计算系统中进行任务调度和分配的创新方法。我们的重点是提高任务执行的效率和成本效益,特别强调优化时间跨度和资源利用率。这是通过引入先进的最大最小算法来实现的,该算法建立在传统方法的基础上,能显著提高任务间距、等待时间和资源利用率等性能指标。之所以选择 Max-Min 算法,是因为该算法能够在任务执行时间和资源利用率之间取得平衡,使其成为应对云任务调度挑战的合适候选算法。此外,这项工作的一个重要贡献是在调度框架中集成了成本感知算法。该算法能够有效管理任务执行成本,确保符合用户需求,同时在云服务提供商的约束条件下运行。所提出的方法可根据成本因素动态调整任务分配。此外,所提出的方法还能提高云计算部署的整体经济效益。研究结果表明,在时间跨度、等待时间和资源利用率方面,所提出的高级最大最小算法优于传统的最大最小算法、最小最小算法和 SJF 算法。
{"title":"Advanced cost-aware Max–Min workflow tasks allocation and scheduling in cloud computing systems","authors":"Mostafa Raeisi-Varzaneh, Omar Dakkak, Yousef Fazea, Mohammed Golam Kaosar","doi":"10.1007/s10586-024-04594-1","DOIUrl":"https://doi.org/10.1007/s10586-024-04594-1","url":null,"abstract":"<p>Cloud computing has emerged as an efficient distribution platform in modern distributed computing offering scalability and flexibility. Task scheduling is considered as one of the main crucial aspects of cloud computing. The primary purpose of the task scheduling mechanism is to reduce the cost and makespan and determine which virtual machine (VM) needs to be selected to execute the task. It is widely acknowledged as a nondeterministic polynomial-time complete problem, necessitating the development of an efficient solution. This paper presents an innovative approach to task scheduling and allocation within cloud computing systems. Our focus lies on improving both the efficiency and cost-effectiveness of task execution, with a specific emphasis on optimizing makespan and resource utilization. This is achieved through the introduction of an Advanced Max–Min Algorithm, which builds upon traditional methodologies to significantly enhance performance metrics such as makespan, waiting time, and resource utilization. The selection of the Max–Min algorithm is rooted in its ability to strike a balance between task execution time and resource utilization, making it a suitable candidate for addressing the challenges of cloud task scheduling. Furthermore, a key contribution of this work is the integration of a cost-aware algorithm into the scheduling framework. This algorithm enables the effective management of task execution costs, ensuring alignment with user requirements while operating within the constraints of cloud service providers. The proposed method adjusts task allocation based on cost considerations dynamically. Additionally, the presented approach enhances the overall economic efficiency of cloud computing deployments. The findings demonstrate that the proposed Advanced Max–Min Algorithm outperforms the traditional Max–Min, Min–Min, and SJF algorithms with respect to makespan, waiting time, and resource utilization.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141532574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research and optimization of task scheduling algorithm based on heterogeneous multi-core processor 基于异构多核处理器的任务调度算法研究与优化
Pub Date : 2024-06-27 DOI: 10.1007/s10586-024-04606-0
Junnan Liu, Yifan Liu, Yongkang Ding

Heterogeneous multi-core processor has the ability to switch between different types of cores to perform tasks, which provides more space and possibility for realizing efficient operation of computer system and improving computer computing power. Current research focuses on heterogeneous multiprocessor systems with high performance or low power consumption to reduce system energy consumption. However, some studies have shown that excessive voltage reduction may lead to an increase in transient failure rates, reducing system reliability. This paper studies the energy optimal scheduling problem of HMSS with DVFS under the constraints of minimum time and reliability, and proposes an improved wild horse optimization algorithm (OIWHO), which improves the efficiency of heterogeneous task scheduling and shortens the task completion time. The algorithm uses the learning and chaos perturbation strategies based on opposition and crossover strategies to balance the search and utilization capabilities, and can further improve the performance of OIWHO. Compared with previous work, our proposed algorithm has more advantages than existing algorithms. Experimental results show that the average computing time of OIWHO algorithm is 12.58%, 11.42%, 7.53%, 4.20% and 3.21% faster than DRNN-BWO, PSO, GWO-GA, GACSH and OIWOAH, respectively. Especially when solving large-scale problems, our algorithm takes less time than other algorithms.

异构多核处理器具有在不同类型的内核之间切换执行任务的能力,这为实现计算机系统的高效运行、提高计算机计算能力提供了更大的空间和可能。目前的研究主要集中在高性能或低功耗的异构多核处理器系统上,以降低系统能耗。然而,一些研究表明,过度降低电压可能会导致瞬态故障率增加,降低系统可靠性。本文研究了带 DVFS 的 HMSS 在最小时间和可靠性约束下的能量最优调度问题,提出了一种改进的野马优化算法(OIWHO),提高了异构任务调度的效率,缩短了任务完成时间。该算法采用基于对立和交叉策略的学习和混沌扰动策略,平衡了搜索能力和利用能力,能进一步提高 OIWHO 的性能。与之前的工作相比,我们提出的算法比现有算法更具优势。实验结果表明,OIWHO 算法的平均计算时间分别比 DRNN-BWO、PSO、GWO-GA、GACSH 和 OIWOAH 快 12.58%、11.42%、7.53%、4.20% 和 3.21%。特别是在解决大规模问题时,我们的算法比其他算法耗时更短。
{"title":"Research and optimization of task scheduling algorithm based on heterogeneous multi-core processor","authors":"Junnan Liu, Yifan Liu, Yongkang Ding","doi":"10.1007/s10586-024-04606-0","DOIUrl":"https://doi.org/10.1007/s10586-024-04606-0","url":null,"abstract":"<p>Heterogeneous multi-core processor has the ability to switch between different types of cores to perform tasks, which provides more space and possibility for realizing efficient operation of computer system and improving computer computing power. Current research focuses on heterogeneous multiprocessor systems with high performance or low power consumption to reduce system energy consumption. However, some studies have shown that excessive voltage reduction may lead to an increase in transient failure rates, reducing system reliability. This paper studies the energy optimal scheduling problem of HMSS with DVFS under the constraints of minimum time and reliability, and proposes an improved wild horse optimization algorithm (OIWHO), which improves the efficiency of heterogeneous task scheduling and shortens the task completion time. The algorithm uses the learning and chaos perturbation strategies based on opposition and crossover strategies to balance the search and utilization capabilities, and can further improve the performance of OIWHO. Compared with previous work, our proposed algorithm has more advantages than existing algorithms. Experimental results show that the average computing time of OIWHO algorithm is 12.58%, 11.42%, 7.53%, 4.20% and 3.21% faster than DRNN-BWO, PSO, GWO-GA, GACSH and OIWOAH, respectively. Especially when solving large-scale problems, our algorithm takes less time than other algorithms.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cluster Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1