首页 > 最新文献

Cluster Computing最新文献

英文 中文
A two-way trust routing scheme to improve security in fog computing environment 提高雾计算环境安全性的双向信任路由方案
Pub Date : 2024-06-23 DOI: 10.1007/s10586-024-04621-1
Jun Wang, Ze Luo, Chenglong Wang

Compliance with security requirements in the fog computing environment is known as an important phenomenon in maintaining the quality of service due to the dynamic topology. Security and privacy breaches can occur in fog computing because of its properties and the adaptability of its deployment method. These characteristics render current systems inappropriate for fog computing, including support for high mobility, a dynamic environment, geographic distribution, awareness of location, closeness to end users, and absence of redundancy. Although efficient secure routing protocols have been developed by researchers in recent years, it is challenging to ensure security, reliability, and quality of service at the same time to overcome the limitations of cloud-fog computing. In light of the fact that trust management is an effective means of protecting sensitive information, this study proposes a two-way trust management system (TMS) that would enable both the service requester and the service provider to verify each other's reliability and safety. The trustworthiness of the service seeker can also be verified in this way. So that fog clients can confirm that fog nodes can deliver suitable, dependable, and secure services, trust in a fog computing environment should ideally be two-way. The ability to verify the authenticity of fog clients is an important capability for fog nodes to have. A distributed, event-based, multi-trust trust system is presented by the suggested approach to trust computation, which makes use of social relationships (nodes and clients) and service quality criteria. Hence, the trust score is computed using a number of characteristics. Here, the weight of direct and indirect ratings is emphasized, and the final trust score is computed by dynamically merging the information gained from self-observation and the suggestions of nearby nodes. An extensive evaluation of the proposed method shows that it is resistant to a large number of badly behaved nodes and can successfully neutralize trust-based attacks.

众所周知,由于拓扑结构的动态性,在雾计算环境中遵守安全要求是保持服务质量的一个重要现象。由于雾计算的特性及其部署方法的适应性,在雾计算中可能会出现安全和隐私漏洞。这些特性使得目前的系统不适合雾计算,包括支持高移动性、动态环境、地理分布、位置感知、接近终端用户以及无冗余。虽然近年来研究人员开发出了高效安全的路由协议,但要同时确保安全性、可靠性和服务质量,以克服云雾计算的局限性,仍具有挑战性。鉴于信任管理是保护敏感信息的有效手段,本研究提出了一种双向信任管理系统(TMS),使服务请求者和服务提供者都能验证对方的可靠性和安全性。服务寻求者的可信度也可以通过这种方式得到验证。为了让雾客户能够确认雾节点能够提供合适、可靠和安全的服务,雾计算环境中的信任最好是双向的。验证雾客户端的真实性是雾节点必须具备的一项重要能力。建议的信任计算方法利用社会关系(节点和客户)和服务质量标准,提出了一种基于事件的分布式多信任信任系统。因此,信任分值是通过一系列特征计算出来的。在这里,直接和间接评价的权重得到了强调,最终的信任分值是通过动态合并从自我观察中获得的信息和附近节点的建议计算得出的。对所提方法的广泛评估表明,该方法能抵御大量行为不良的节点,并能成功化解基于信任的攻击。
{"title":"A two-way trust routing scheme to improve security in fog computing environment","authors":"Jun Wang, Ze Luo, Chenglong Wang","doi":"10.1007/s10586-024-04621-1","DOIUrl":"https://doi.org/10.1007/s10586-024-04621-1","url":null,"abstract":"<p>Compliance with security requirements in the fog computing environment is known as an important phenomenon in maintaining the quality of service due to the dynamic topology. Security and privacy breaches can occur in fog computing because of its properties and the adaptability of its deployment method. These characteristics render current systems inappropriate for fog computing, including support for high mobility, a dynamic environment, geographic distribution, awareness of location, closeness to end users, and absence of redundancy. Although efficient secure routing protocols have been developed by researchers in recent years, it is challenging to ensure security, reliability, and quality of service at the same time to overcome the limitations of cloud-fog computing. In light of the fact that trust management is an effective means of protecting sensitive information, this study proposes a two-way trust management system (TMS) that would enable both the service requester and the service provider to verify each other's reliability and safety. The trustworthiness of the service seeker can also be verified in this way. So that fog clients can confirm that fog nodes can deliver suitable, dependable, and secure services, trust in a fog computing environment should ideally be two-way. The ability to verify the authenticity of fog clients is an important capability for fog nodes to have. A distributed, event-based, multi-trust trust system is presented by the suggested approach to trust computation, which makes use of social relationships (nodes and clients) and service quality criteria. Hence, the trust score is computed using a number of characteristics. Here, the weight of direct and indirect ratings is emphasized, and the final trust score is computed by dynamically merging the information gained from self-observation and the suggestions of nearby nodes. An extensive evaluation of the proposed method shows that it is resistant to a large number of badly behaved nodes and can successfully neutralize trust-based attacks.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel hybrid Artificial Gorilla Troops Optimizer with Honey Badger Algorithm for solving cloud scheduling problem 用于解决云调度问题的新型混合人工大猩猩部队优化器与蜜獾算法
Pub Date : 2024-06-22 DOI: 10.1007/s10586-024-04605-1
Abdelazim G. Hussien, Amit Chhabra, Fatma A. Hashim, Adrian Pop

Cloud computing has revolutionized the way a variety of ubiquitous computing resources are provided to users with ease and on a pay-per-usage basis. Task scheduling problem is an important challenge, which involves assigning resources to users’ Bag-of-Tasks applications in a way that maximizes either system provider or user performance or both. With the increase in system size and the number of applications, the Bag-of-Tasks scheduling (BoTS) problem becomes more complex due to the expansion of search space. Such a problem falls in the category of NP-hard optimization challenges, which are often effectively tackled by metaheuristics. However, standalone metaheuristics generally suffer from certain deficiencies which affect their searching efficiency resulting in deteriorated final performance. This paper aims to introduce an optimal hybrid metaheuristic algorithm by leveraging the strengths of both the Artificial Gorilla Troops Optimizer (GTO) and the Honey Badger Algorithm (HBA) to find an approximate scheduling solution for the BoTS problem. While the original GTO has demonstrated effectiveness since its inception, it possesses limitations, particularly in addressing composite and high-dimensional problems. To address these limitations, this paper proposes a novel approach by introducing a new updating equation inspired by the HBA, specifically designed to enhance the exploitation phase of the algorithm. Through this integration, the goal is to overcome the drawbacks of the GTO and improve its performance in solving complex optimization problems. The initial performance of the GTOHBA algorithm tested on standard CEC2017 and CEC2022 benchmarks shows significant performance improvement over the baseline metaheuristics. Later on, we applied the proposed GTOHBA on the BoTS problem using standard parallel workloads (CEA-Curie and HPC2N) to optimize makespan and energy objectives. The obtained outcomes of the proposed GTOHBA are compared to the scheduling techniques based on well-known metaheuristics under the same experimental conditions using standard statistical measures and box plots. In the case of CEA-Curie workloads, the GTOHBA produced makespan and energy consumption reduction in the range of 8.12–22.76% and 6.2–18.00%, respectively over the compared metaheuristics. Whereas for the HPC2N workloads, GTOHBA achieved 8.46–30.97% makespan reduction and 8.51–33.41% energy consumption reduction against the tested metaheuristics. In conclusion, the proposed hybrid metaheuristic algorithm provides a promising solution to the BoTS problem, that can enhance the performance and efficiency of cloud computing systems.

云计算彻底改变了以按使用付费的方式向用户轻松提供各种无所不在的计算资源的方式。任务调度问题是一个重要的挑战,它涉及为用户的 "任务袋 "应用程序分配资源,从而最大限度地提高系统提供商或用户的性能,或两者兼顾。随着系统规模和应用程序数量的增加,任务袋调度(BoTS)问题会因搜索空间的扩大而变得更加复杂。这类问题属于 NP 难度较大的优化挑战,通常可以通过元启发式算法有效解决。然而,独立的元启发式算法通常存在某些缺陷,影响了其搜索效率,导致最终性能下降。本文旨在利用人工猩猩部队优化算法(GTO)和蜜獾算法(HBA)的优势,引入一种最佳混合元启发式算法,为 BoTS 问题找到近似调度解决方案。虽然最初的 GTO 自诞生以来就证明了其有效性,但它也存在局限性,尤其是在处理复合问题和高维问题时。为了解决这些局限性,本文提出了一种新方法,即引入一个受 HBA 启发的新更新方程,专门用于增强算法的开发阶段。通过这种整合,目标是克服 GTO 的缺点,提高其解决复杂优化问题的性能。在标准 CEC2017 和 CEC2022 基准上测试的 GTOHBA 算法的初始性能表明,与基线元启发式相比,其性能有了显著提高。随后,我们使用标准并行工作负载(CEA-Curie 和 HPC2N)将所提出的 GTOHBA 应用于 BoTS 问题,以优化时间跨度和能量目标。在相同的实验条件下,我们使用标准统计量和箱形图,将所提出的 GTOHBA 的结果与基于著名元启发式算法的调度技术进行了比较。就 CEA-Curie 工作负载而言,GTOHBA 比所比较的元启发式算法分别减少了 8.12-22.76% 的时间跨度和 6.2-18.00% 的能耗。而对于 HPC2N 工作负载,GTOHBA 与测试过的元启发式相比,成功率降低了 8.46-30.97% ,能耗降低了 8.51-33.41%。总之,所提出的混合元启发式算法为 BoTS 问题提供了一种有前途的解决方案,可以提高云计算系统的性能和效率。
{"title":"A novel hybrid Artificial Gorilla Troops Optimizer with Honey Badger Algorithm for solving cloud scheduling problem","authors":"Abdelazim G. Hussien, Amit Chhabra, Fatma A. Hashim, Adrian Pop","doi":"10.1007/s10586-024-04605-1","DOIUrl":"https://doi.org/10.1007/s10586-024-04605-1","url":null,"abstract":"<p>Cloud computing has revolutionized the way a variety of ubiquitous computing resources are provided to users with ease and on a pay-per-usage basis. Task scheduling problem is an important challenge, which involves assigning resources to users’ Bag-of-Tasks applications in a way that maximizes either system provider or user performance or both. With the increase in system size and the number of applications, the Bag-of-Tasks scheduling (<i>BoTS</i>) problem becomes more complex due to the expansion of search space. Such a problem falls in the category of NP-hard optimization challenges, which are often effectively tackled by metaheuristics. However, standalone metaheuristics generally suffer from certain deficiencies which affect their searching efficiency resulting in deteriorated final performance. This paper aims to introduce an optimal hybrid metaheuristic algorithm by leveraging the strengths of both the Artificial Gorilla Troops Optimizer (GTO) and the Honey Badger Algorithm (HBA) to find an approximate scheduling solution for the <i>BoTS</i> problem. While the original GTO has demonstrated effectiveness since its inception, it possesses limitations, particularly in addressing composite and high-dimensional problems. To address these limitations, this paper proposes a novel approach by introducing a new updating equation inspired by the HBA, specifically designed to enhance the exploitation phase of the algorithm. Through this integration, the goal is to overcome the drawbacks of the GTO and improve its performance in solving complex optimization problems. The initial performance of the GTOHBA algorithm tested on standard CEC2017 and CEC2022 benchmarks shows significant performance improvement over the baseline metaheuristics. Later on, we applied the proposed GTOHBA on the <i>BoTS</i> problem using standard parallel workloads (CEA-Curie and HPC2N) to optimize makespan and energy objectives. The obtained outcomes of the proposed GTOHBA are compared to the scheduling techniques based on well-known metaheuristics under the same experimental conditions using standard statistical measures and box plots. In the case of CEA-Curie workloads, the GTOHBA produced makespan and energy consumption reduction in the range of 8.12–22.76% and 6.2–18.00%, respectively over the compared metaheuristics. Whereas for the HPC2N workloads, GTOHBA achieved 8.46–30.97% makespan reduction and 8.51–33.41% energy consumption reduction against the tested metaheuristics. In conclusion, the proposed hybrid metaheuristic algorithm provides a promising solution to the <i>BoTS</i> problem, that can enhance the performance and efficiency of cloud computing systems.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing quantum-secure attribute-based encryption 设计基于属性的量子安全加密
Pub Date : 2024-06-22 DOI: 10.1007/s10586-024-04546-9
Y. Sreenivasa Rao, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath

In the last couple of decades, Attribute-Based Encryption (ABE) has been a promising encryption technique to realize fine-grained access control over encrypted data. ABE has appealing functionalities such as (i) access control through encryption and (ii) encrypting a message to a group of recipients without knowing their actual identities. However, the existing state-of-the-art ABEs are based on number-theoretic hardness assumptions. These designs are not secure against attacks by quantum algorithms such as Shor algorithm. Moreover, existing Post-Quantum Cryptography (PQC)-based ABEs fail to provide long-term security. Therefore, there is a need for quantum secure ABE that can withstand quantum attacks and provides long-term security. In this work, for the first time, we introduce the notion of a quantum-secure ABE (qABE) framework that preserves the classical ABE’s functionalities and resists quantum attacks. Next, we provide a generic construction of qABE which is able to transform any existing ABE into qABE scheme. Thereafter, we illustrate a concrete construction of a quantum ABE based on our generic transformation qABE and the Waters’ ciphertext-policy ABE scheme.

在过去几十年里,基于属性的加密(ABE)一直是一种很有前途的加密技术,可实现对加密数据的细粒度访问控制。ABE 具有以下吸引人的功能:(i) 通过加密实现访问控制;(ii) 在不知道一组接收者实际身份的情况下为他们加密信息。然而,现有的最先进 ABE 都基于数论硬度假设。这些设计无法抵御 Shor 算法等量子算法的攻击。此外,现有的基于后量子密码学(PQC)的 ABE 无法提供长期安全性。因此,需要能抵御量子攻击并提供长期安全性的量子安全 ABE。在这项研究中,我们首次提出了量子安全 ABE(qABE)框架的概念,它既保留了经典 ABE 的功能,又能抵御量子攻击。接下来,我们提供了一种 qABE 的通用构造,它能够将任何现有 ABE 转换为 qABE 方案。之后,我们将说明基于我们的通用转换 qABE 和沃特斯密码策略 ABE 方案的量子 ABE 的具体构造。
{"title":"Designing quantum-secure attribute-based encryption","authors":"Y. Sreenivasa Rao, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath","doi":"10.1007/s10586-024-04546-9","DOIUrl":"https://doi.org/10.1007/s10586-024-04546-9","url":null,"abstract":"<p>In the last couple of decades, Attribute-Based Encryption (ABE) has been a promising encryption technique to realize fine-grained access control over encrypted data. ABE has appealing functionalities such as (i) access control through encryption and (ii) encrypting a message to a group of recipients without knowing their actual identities. However, the existing state-of-the-art ABEs are based on number-theoretic hardness assumptions. These designs are not secure against attacks by quantum algorithms such as Shor algorithm. Moreover, existing Post-Quantum Cryptography (PQC)-based ABEs fail to provide long-term security. Therefore, there is a need for quantum secure ABE that can withstand quantum attacks and provides long-term security. In this work, for the first time, we introduce the notion of a quantum-secure ABE (<span>qABE</span>) framework that preserves the classical ABE’s functionalities and resists quantum attacks. Next, we provide a generic construction of <span>qABE</span> which is able to transform any existing ABE into <span>qABE</span> scheme. Thereafter, we illustrate a concrete construction of a quantum ABE based on our generic transformation <span>qABE</span> and the Waters’ ciphertext-policy ABE scheme.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141531642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient communication-aware VM placement in cloud datacenter using hybrid ACO–GWO 使用混合 ACO-GWO 在云数据中心进行高能效的通信感知虚拟机安置
Pub Date : 2024-06-22 DOI: 10.1007/s10586-024-04623-z
Rashmi Keshri, Deo Prakash Vidyarthi

Virtual machine placement (VMP) is the process of mapping virtual machines to physical machines, which is very important for resource utilization in cloud data centres. As such, VM placement is an NP-class problem, and therefore, researchers have frequently applied meta-heuristics for this. In this study, we applied a hybrid meta-heuristic that combines ant colony optimisation (ACO) and grey wolf optimisation (GWO) to minimise resource wastage, energy consumption, and bandwidth usage. The performance study of the proposed work is conducted on variable number of virtual machines with different resource correlation coefficients. According to the observations, there is 2.85%, 7.61%, 15.78% and 19.41% improvement in power consumption, 26.44%, 57.83%, 77.90% and 83.89% improvement in resource wastage and 2.94%, 8.20%, 9.99% and 10.72% improvement in bandwidth utilisation as compared to multi-objective GA, ACO, FFD and random based algorithm respectively. To study the convergence of the proposed method, it is compared with few recent hybrid meta-heuristic algorithms, namely ACO–PSO, GA–PSO, GA–ACO and GA–GWO which exhibits that the proposed hybrid method converges faster.

虚拟机放置(VMP)是将虚拟机映射到物理机的过程,对于云数据中心的资源利用非常重要。因此,虚拟机放置是一个 NP 级问题,所以研究人员经常为此应用元启发式。在本研究中,我们应用了一种混合元启发式,它结合了蚁群优化(ACO)和灰狼优化(GWO),以最大限度地减少资源浪费、能源消耗和带宽使用。对所提工作的性能研究是在不同资源相关系数的虚拟机数量上进行的。根据观察结果,与多目标 GA、ACO、FFD 和基于随机的算法相比,功耗分别提高了 2.85%、7.61%、15.78% 和 19.41%,资源浪费分别提高了 26.44%、57.83%、77.90% 和 83.89%,带宽利用率分别提高了 2.94%、8.20%、9.99% 和 10.72%。为了研究拟议方法的收敛性,将其与最近的几种混合元启发式算法(即 ACO-PSO、GA-PSO、GA-ACO 和 GA-GWO)进行了比较,结果表明拟议的混合方法收敛更快。
{"title":"Energy-efficient communication-aware VM placement in cloud datacenter using hybrid ACO–GWO","authors":"Rashmi Keshri, Deo Prakash Vidyarthi","doi":"10.1007/s10586-024-04623-z","DOIUrl":"https://doi.org/10.1007/s10586-024-04623-z","url":null,"abstract":"<p>Virtual machine placement (VMP) is the process of mapping virtual machines to physical machines, which is very important for resource utilization in cloud data centres. As such, VM placement is an NP-class problem, and therefore, researchers have frequently applied meta-heuristics for this. In this study, we applied a hybrid meta-heuristic that combines ant colony optimisation (ACO) and grey wolf optimisation (GWO) to minimise resource wastage, energy consumption, and bandwidth usage. The performance study of the proposed work is conducted on variable number of virtual machines with different resource correlation coefficients. According to the observations, there is 2.85%, 7.61%, 15.78% and 19.41% improvement in power consumption, 26.44%, 57.83%, 77.90% and 83.89% improvement in resource wastage and 2.94%, 8.20%, 9.99% and 10.72% improvement in bandwidth utilisation as compared to multi-objective GA, ACO, FFD and random based algorithm respectively. To study the convergence of the proposed method, it is compared with few recent hybrid meta-heuristic algorithms, namely ACO–PSO, GA–PSO, GA–ACO and GA–GWO which exhibits that the proposed hybrid method converges faster.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks 软件定义网络中的 DDoS 检测、缓解和防御策略综合调查
Pub Date : 2024-06-22 DOI: 10.1007/s10586-024-04596-z
Ankit Kumar Jain, Hariom Shukla, Diksha Goel

Software Defined Networking (SDN) has become increasingly prevalent in cloud computing, Internet of Things (IoT), and various environments to optimize network efficiency. While it provides a flexible network infrastructure, it also faces security threats, particularly from Distributed Denial of Service (DDoS) attacks due to its centralized design. This survey comprehensively reviews the efforts of various researchers in safeguarding SDN against DDoS attacks and analyzes different detection and mitigation strategies employed in SDN environments. Furthermore, the survey explores various types of DDoS attacks that can occur across different planes and communication links in SDN. Additionally, emerging security measures for preventing DDoS attacks in SDN are examined. The survey also reviews the datasets, tools, and simulators used for detecting DDoS attacks in SDN. Moreover, the survey identifies various open challenges in detecting and mitigating DDoS attacks in SDN and outlines potential future research directions. Lastly, the survey provides a comprehensive comparative analysis of various DDoS detection techniques based on various essential parameters.

为了优化网络效率,软件定义网络(SDN)在云计算、物联网(IoT)和各种环境中变得越来越普遍。它在提供灵活的网络基础设施的同时,也面临着安全威胁,特别是由于其集中式设计而导致的分布式拒绝服务(DDoS)攻击。本调查全面回顾了不同研究人员在保护 SDN 免受 DDoS 攻击方面所做的努力,并分析了在 SDN 环境中采用的不同检测和缓解策略。此外,调查还探讨了可能在 SDN 不同平面和通信链路上发生的各种类型的 DDoS 攻击。此外,还研究了在 SDN 中预防 DDoS 攻击的新兴安全措施。调查还回顾了用于检测 SDN 中 DDoS 攻击的数据集、工具和模拟器。此外,调查还确定了在 SDN 中检测和缓解 DDoS 攻击的各种公开挑战,并概述了潜在的未来研究方向。最后,调查根据各种基本参数对各种 DDoS 检测技术进行了全面的比较分析。
{"title":"A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks","authors":"Ankit Kumar Jain, Hariom Shukla, Diksha Goel","doi":"10.1007/s10586-024-04596-z","DOIUrl":"https://doi.org/10.1007/s10586-024-04596-z","url":null,"abstract":"<p> Software Defined Networking (SDN) has become increasingly prevalent in cloud computing, Internet of Things (IoT), and various environments to optimize network efficiency. While it provides a flexible network infrastructure, it also faces security threats, particularly from Distributed Denial of Service (DDoS) attacks due to its centralized design. This survey comprehensively reviews the efforts of various researchers in safeguarding SDN against DDoS attacks and analyzes different detection and mitigation strategies employed in SDN environments. Furthermore, the survey explores various types of DDoS attacks that can occur across different planes and communication links in SDN. Additionally, emerging security measures for preventing DDoS attacks in SDN are examined. The survey also reviews the datasets, tools, and simulators used for detecting DDoS attacks in SDN. Moreover, the survey identifies various open challenges in detecting and mitigating DDoS attacks in SDN and outlines potential future research directions. Lastly, the survey provides a comprehensive comparative analysis of various DDoS detection techniques based on various essential parameters. </p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum competitive decision algorithm for the emergency siting problem under given deadline conditions 给定期限条件下紧急选址问题的量子竞争决策算法
Pub Date : 2024-06-21 DOI: 10.1007/s10586-024-04548-7
Wei Zhao, Weiming Gao, Shengnan Gao, Chenmei Teng, Xiaoya Zhu

Allocating emergency resources effectively is an essential aspect of disaster preparation and response. The Emergency Siting Problem (ESP) involves identifying the best places to locate emergency services in order that it can serve the most people in the least amount of time. Maintaining time limitations is of greatest significance in situations where each second matters, such as during disasters or public health emergencies. In this study, we concentrate on the difficulty of solving the ESP under extreme time limits. In this research, Genetic-adaptive reptile search optimization (GRSO) is proposed to provide a different way to solve the ESP problem within the constraints of limited time. The proposed GRSO method takes into account travel times, prospective facility places, and the geographic location of demand sites while keeping to the established time restrictions. In this study, the proposed method demonstrating superior performance accuracy in locating transportation facilities under extreme time limits for Emergency Service Planning (ESP), outperforming established optimization strategies and heuristics commonly applied to ESP problems. A fitness function is created to assess the standard of responses based on elements including response speed, coverage, and meeting deadlines. The GRSO algorithm has been modified and altered to handle the distinctive features of the ESP, such as precise facility placements and time constraints. Simulated and real-world datasets describing emergency circumstances are used in computational research to confirm the efficiency of the proposed method. The results are evaluated with established optimization strategies and heuristics generally applied to ESP problems. Results show that the GRSOapproach provides solutions that are more in pace with time limit constraints without sacrificing sufficient degrees of coverage or response time.

有效分配应急资源是备灾和救灾的一个重要方面。应急选址问题(ESP)涉及确定应急服务的最佳地点,以便在最短的时间内为最多的人提供服务。在分秒必争的情况下,例如在灾难或公共卫生突发事件中,保持时间限制是最重要的。在本研究中,我们将重点放在极端时间限制下解决 ESP 的难度上。本研究提出了遗传自适应爬行动物搜索优化法(GRSO),为在有限时间内解决 ESP 问题提供了一种不同的方法。所提出的 GRSO 方法在遵守既定时间限制的同时,还考虑了旅行时间、预期设施地点和需求地点的地理位置。在这项研究中,所提出的方法在为紧急服务规划(ESP)确定极端时间限制下的交通设施位置方面表现出了卓越的准确性,优于常用于紧急服务规划问题的既定优化策略和启发式方法。根据响应速度、覆盖范围和满足截止日期等要素创建了一个适应度函数,用于评估响应标准。对 GRSO 算法进行了修改和变更,以处理 ESP 的显著特征,如精确的设施安置和时间限制。在计算研究中使用了描述紧急情况的模拟数据集和真实数据集,以确认所提方法的效率。研究结果与通常应用于 ESP 问题的既定优化策略和启发式方法进行了评估。结果表明,GRSO 方法提供的解决方案更符合时限限制,同时又不会牺牲足够的覆盖范围或响应时间。
{"title":"Quantum competitive decision algorithm for the emergency siting problem under given deadline conditions","authors":"Wei Zhao, Weiming Gao, Shengnan Gao, Chenmei Teng, Xiaoya Zhu","doi":"10.1007/s10586-024-04548-7","DOIUrl":"https://doi.org/10.1007/s10586-024-04548-7","url":null,"abstract":"<p>Allocating emergency resources effectively is an essential aspect of disaster preparation and response. The Emergency Siting Problem (ESP) involves identifying the best places to locate emergency services in order that it can serve the most people in the least amount of time. Maintaining time limitations is of greatest significance in situations where each second matters, such as during disasters or public health emergencies. In this study, we concentrate on the difficulty of solving the ESP under extreme time limits. In this research, Genetic-adaptive reptile search optimization (GRSO) is proposed to provide a different way to solve the ESP problem within the constraints of limited time. The proposed GRSO method takes into account travel times, prospective facility places, and the geographic location of demand sites while keeping to the established time restrictions. In this study, the proposed method demonstrating superior performance accuracy in locating transportation facilities under extreme time limits for Emergency Service Planning (ESP), outperforming established optimization strategies and heuristics commonly applied to ESP problems. A fitness function is created to assess the standard of responses based on elements including response speed, coverage, and meeting deadlines. The GRSO algorithm has been modified and altered to handle the distinctive features of the ESP, such as precise facility placements and time constraints. Simulated and real-world datasets describing emergency circumstances are used in computational research to confirm the efficiency of the proposed method. The results are evaluated with established optimization strategies and heuristics generally applied to ESP problems. Results show that the GRSOapproach provides solutions that are more in pace with time limit constraints without sacrificing sufficient degrees of coverage or response time.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved aquila optimizer with mRMR for feature selection of high-dimensional gene expression data 利用 mRMR 改进 aquila 优化器,用于高维基因表达数据的特征选择
Pub Date : 2024-06-20 DOI: 10.1007/s10586-024-04614-0
Xiwen Qin, Siqi Zhang, Xiaogang Dong, Hongyu Shi, Liping Yuan

Accurate classification of gene expression data is crucial for disease diagnosis and drug discovery. However, gene expression data usually has a large number of features, which poses a challenge for accurate classification. In this paper, a novel feature selection method based on minimal redundancy maximal relevance (mRMR) and aquila optimizer is proposed, which introduces the mRMR method in the initialization stage of the population to generate excellent initial populations, effectively improve the quality of the population, and then, the using random opposition-based learning strategy to improve the diversity of aquila population and accelerate the convergence speed of the algorithm, and finally, introducing inertia weight in the position update formula in the late iteration of the aquila optimizer to avoid the algorithm falling into the local optimum and improve the algorithm’s capability to find the optimum. In order to verify the effectiveness of the proposed method, ten real gene expression datasets are selected in this paper and compared with several meta-heuristic algorithms. Experimental results show that the proposed method is significantly superior to other meta-heuristic algorithms in terms of fitness value, classification accuracy and the number of selected features. Compared with the original aquila optimizer, the average classification accuracy of the proposed method on KNN and SVM classifiers is improved by 3.48–12.41% and 0.53–18.63% respectively. The proposed method significantly reduces the feature dimension of gene expression data, retains important features, and obtains higher classification accuracy, providing a new method and idea for feature selection of gene expression data.

基因表达数据的准确分类对于疾病诊断和药物发现至关重要。然而,基因表达数据通常具有大量特征,这给准确分类带来了挑战。本文提出了一种基于最小冗余最大相关性(mRMR)和 aquila 优化器的新型特征选择方法,在种群初始化阶段引入 mRMR 方法,生成优秀的初始种群,有效提高种群质量,然后、最后,在 aquila 优化器迭代后期的位置更新公式中引入惯性权重,避免算法陷入局部最优,提高算法的寻优能力。为了验证所提方法的有效性,本文选取了十个真实的基因表达数据集,并与几种元启发式算法进行了比较。实验结果表明,本文提出的方法在适配值、分类准确率和所选特征数量方面都明显优于其他元启发式算法。与原始的 aquila 优化器相比,拟议方法在 KNN 和 SVM 分类器上的平均分类准确率分别提高了 3.48-12.41% 和 0.53-18.63%。所提方法大大降低了基因表达数据的特征维度,保留了重要特征,获得了更高的分类准确率,为基因表达数据的特征选择提供了一种新的方法和思路。
{"title":"Improved aquila optimizer with mRMR for feature selection of high-dimensional gene expression data","authors":"Xiwen Qin, Siqi Zhang, Xiaogang Dong, Hongyu Shi, Liping Yuan","doi":"10.1007/s10586-024-04614-0","DOIUrl":"https://doi.org/10.1007/s10586-024-04614-0","url":null,"abstract":"<p>Accurate classification of gene expression data is crucial for disease diagnosis and drug discovery. However, gene expression data usually has a large number of features, which poses a challenge for accurate classification. In this paper, a novel feature selection method based on minimal redundancy maximal relevance (mRMR) and aquila optimizer is proposed, which introduces the mRMR method in the initialization stage of the population to generate excellent initial populations, effectively improve the quality of the population, and then, the using random opposition-based learning strategy to improve the diversity of aquila population and accelerate the convergence speed of the algorithm, and finally, introducing inertia weight in the position update formula in the late iteration of the aquila optimizer to avoid the algorithm falling into the local optimum and improve the algorithm’s capability to find the optimum. In order to verify the effectiveness of the proposed method, ten real gene expression datasets are selected in this paper and compared with several meta-heuristic algorithms. Experimental results show that the proposed method is significantly superior to other meta-heuristic algorithms in terms of fitness value, classification accuracy and the number of selected features. Compared with the original aquila optimizer, the average classification accuracy of the proposed method on KNN and SVM classifiers is improved by 3.48–12.41% and 0.53–18.63% respectively. The proposed method significantly reduces the feature dimension of gene expression data, retains important features, and obtains higher classification accuracy, providing a new method and idea for feature selection of gene expression data.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OptFBFN: IOT threat mitigation in software-defined networks based on fuzzy approach OptFBFN:基于模糊方法缓解软件定义网络中的物联网威胁
Pub Date : 2024-06-19 DOI: 10.1007/s10586-024-04616-y
B. Dhanalaxmi, Yeligeti Raju, B. Saritha, N. Sabitha, Namita Parati, Kandula Damodhar Rao

Software-Defined Networking (SDN) has emerged as a new architectural paradigm in computer networks, aiming to enhance network capabilities and address the limitations of conventional networks. Despite its many advantages, SDN has encountered numerous attack risks and vulnerabilities. Using an intrusion detection system (IDS) is one of the most important ways to address threats and concerns in the SDN. The great flexibility, adaptability, and programmability of SDN, together with other unique qualities, make the integration of IDS into the SDN network effective. The majority of these methods are less scalable and have poor accuracy. This research suggests an Optimized Fuzzy Based Function Network (OFBFN) to solve this problem. The Modified ResNet152 method is utilized to extract features from the input data. The Binary Waterwheel Plant Algorithm (BWWPA) selects the essential features. To characterize attacks within the InSDN, BOT-IOT, ToN-IoT, and CICIDS 2019 datasets, the system first selects the most efficient features. Then, it employs the FBFN with the Coatis Optimization Algorithm for classification. The suggested system classifies attacks and benign traffic, distinguishes between different types of attacks, and specifies high-performance sub-attacks. Four benchmark datasets were utilized for training and evaluating the proposed system, demonstrating its effectiveness. According to the findings from the experiments, the suggested approach performs better than others at identifying a wide range of threats.

软件定义网络(SDN)已成为计算机网络的一种新架构范式,旨在增强网络功能,解决传统网络的局限性。尽管 SDN 有许多优点,但也遇到了许多攻击风险和漏洞。使用入侵检测系统(IDS)是解决 SDN 威胁和问题的重要方法之一。SDN 具有极大的灵活性、适应性和可编程性,再加上其他独特的品质,使得将 IDS 集成到 SDN 网络中非常有效。这些方法大多可扩展性差,准确性低。本研究提出了一种基于模糊函数的优化网络(OFBFN)来解决这一问题。利用修改后的 ResNet152 方法从输入数据中提取特征。二进制水车工厂算法(BWWPA)可选择基本特征。为了描述 InSDN、BOT-IOT、ToN-IoT 和 CICIDS 2019 数据集中的攻击特征,系统首先选择了最有效的特征。然后,系统采用 FBFN 和 Coatis 优化算法进行分类。建议的系统可对攻击和良性流量进行分类,区分不同类型的攻击,并指定高性能的子攻击。利用四个基准数据集对所建议的系统进行了训练和评估,证明了其有效性。根据实验结果,建议的方法在识别各种威胁方面比其他方法表现更好。
{"title":"OptFBFN: IOT threat mitigation in software-defined networks based on fuzzy approach","authors":"B. Dhanalaxmi, Yeligeti Raju, B. Saritha, N. Sabitha, Namita Parati, Kandula Damodhar Rao","doi":"10.1007/s10586-024-04616-y","DOIUrl":"https://doi.org/10.1007/s10586-024-04616-y","url":null,"abstract":"<p>Software-Defined Networking (SDN) has emerged as a new architectural paradigm in computer networks, aiming to enhance network capabilities and address the limitations of conventional networks. Despite its many advantages, SDN has encountered numerous attack risks and vulnerabilities. Using an intrusion detection system (IDS) is one of the most important ways to address threats and concerns in the SDN. The great flexibility, adaptability, and programmability of SDN, together with other unique qualities, make the integration of IDS into the SDN network effective. The majority of these methods are less scalable and have poor accuracy. This research suggests an Optimized Fuzzy Based Function Network (OFBFN) to solve this problem. The Modified ResNet152 method is utilized to extract features from the input data. The Binary Waterwheel Plant Algorithm (BWWPA) selects the essential features. To characterize attacks within the InSDN, BOT-IOT, ToN-IoT, and CICIDS 2019 datasets, the system first selects the most efficient features. Then, it employs the FBFN with the Coatis Optimization Algorithm for classification. The suggested system classifies attacks and benign traffic, distinguishes between different types of attacks, and specifies high-performance sub-attacks. Four benchmark datasets were utilized for training and evaluating the proposed system, demonstrating its effectiveness. According to the findings from the experiments, the suggested approach performs better than others at identifying a wide range of threats.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid metaheuristics for selective inference task offloading under time and energy constraints for real-time IoT sensing systems 实时物联网传感系统在时间和能量限制下选择性推理任务卸载的混合元启发式算法
Pub Date : 2024-06-19 DOI: 10.1007/s10586-024-04578-1
Abdelkarim Ben Sada, Amar Khelloufi, Abdenacer Naouri, Huansheng Ning, Sahraoui Dhelim

The recent widespread of AI-powered real-time applications necessitates the use of edge computing for inference task offloading. Power constrained edge devices are required to balance between processing inference tasks locally or offload to edge servers. This decision is determined according to the time constraint demanded by the real-time nature of applications, and the energy constraint dictated by the device’s power budget. This problem is further exacerbated in the case of systems leveraging multiple local inference models varying in size and accuracy. In this work, we tackle the problem of assigning inference models to inference tasks either using local inference models or by offloading to edge servers under time and energy constraints while maximizing the overall accuracy of the system. This problem is shown to be strongly NP-hard and therefore, we propose a hybrid genetic algorithm (HGSTO) to solve this problem. We leverage the speed of simulated annealing (SA) with the accuracy of genetic algorithms (GA) to develop a hybrid, fast and accurate algorithm compared with classic GA, SA and Particle Swarm Optimization (PSO). Experiment results show that HGSTO achieved on-par or higher accuracy than GA while resulting in significantly lower scheduling times compared to other schemes.

最近,人工智能驱动的实时应用越来越广泛,因此有必要使用边缘计算来卸载推理任务。功率受限的边缘设备需要在本地处理推理任务或将任务卸载到边缘服务器之间取得平衡。这一决定是根据应用的实时性所要求的时间限制和设备的功率预算所决定的能耗限制来做出的。如果系统利用多个规模和精度各不相同的本地推理模型,这个问题就会进一步恶化。在这项工作中,我们要解决的问题是,在时间和能量限制下,利用本地推理模型或通过卸载到边缘服务器来为推理任务分配推理模型,同时最大限度地提高系统的整体准确性。这个问题被证明是强 NP 难,因此我们提出了一种混合遗传算法 (HGSTO) 来解决这个问题。我们利用模拟退火(SA)的速度和遗传算法(GA)的准确性,开发出一种混合、快速、准确的算法,与传统的 GA、SA 和粒子群优化(PSO)相比,具有更高的准确性。实验结果表明,与其他方案相比,HGSTO 实现了与 GA 相当或更高的精确度,同时大大缩短了调度时间。
{"title":"Hybrid metaheuristics for selective inference task offloading under time and energy constraints for real-time IoT sensing systems","authors":"Abdelkarim Ben Sada, Amar Khelloufi, Abdenacer Naouri, Huansheng Ning, Sahraoui Dhelim","doi":"10.1007/s10586-024-04578-1","DOIUrl":"https://doi.org/10.1007/s10586-024-04578-1","url":null,"abstract":"<p>The recent widespread of AI-powered real-time applications necessitates the use of edge computing for inference task offloading. Power constrained edge devices are required to balance between processing inference tasks locally or offload to edge servers. This decision is determined according to the time constraint demanded by the real-time nature of applications, and the energy constraint dictated by the device’s power budget. This problem is further exacerbated in the case of systems leveraging multiple local inference models varying in size and accuracy. In this work, we tackle the problem of assigning inference models to inference tasks either using local inference models or by offloading to edge servers under time and energy constraints while maximizing the overall accuracy of the system. This problem is shown to be strongly NP-hard and therefore, we propose a hybrid genetic algorithm (HGSTO) to solve this problem. We leverage the speed of simulated annealing (SA) with the accuracy of genetic algorithms (GA) to develop a hybrid, fast and accurate algorithm compared with classic GA, SA and Particle Swarm Optimization (PSO). Experiment results show that HGSTO achieved on-par or higher accuracy than GA while resulting in significantly lower scheduling times compared to other schemes.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and verification of software evolution using bigraphical reactive system 利用 bigraphical 反应系统对软件进化进行建模和验证
Pub Date : 2024-06-19 DOI: 10.1007/s10586-024-04597-y
Nisha Pal, Dharmendra Kumar Yadav

Changes are inevitable in software due to technology advancements, and changes in business requirements. Making changes in the software by insertion, deletion or modification of new code may lead to malfunctioning of the old code. Hence, there is a need for a priori analysis to ensure and capture these types of changes to run the software smoothly. Making changes in the software while it is in use is called dynamic evolution. Due to the lack of formal modeling and verification, this dynamic evolution process of software systems has not become prominent. Hence, we used the bigraphical reactive system (BRS) technique to ensure that changes do not break the software functionality (adversely affect the system). BRS provides a powerful framework for modeling, analyzing, and verifying the dynamic evolution of software systems, resulting in ensuring the reliability and correctness of evolving software system. In this paper, we proposed a formal method technique for modeling and verifying the dynamic evolution process (changing user requirements at run time) using the BRS. We used a bigraph to model software architectures and described the evolution rules for supporting the dynamic changes of the software system. Finally, we have used the BigMC model checker tool to validate this model with its properties and provide associated verification procedures.

由于技术的进步和业务需求的变化,软件的更改是不可避免的。通过插入、删除或修改新代码来更改软件,可能会导致旧代码出现故障。因此,有必要进行先验分析,以确保和捕捉这些类型的变更,从而顺利运行软件。在软件使用过程中对其进行更改被称为动态演进。由于缺乏正式的建模和验证,软件系统的这种动态演化过程并不突出。因此,我们使用大图形反应系统(BRS)技术来确保变更不会破坏软件功能(对系统产生不利影响)。BRS为软件系统的动态演化建模、分析和验证提供了一个强大的框架,从而确保了演化软件系统的可靠性和正确性。在本文中,我们提出了一种使用 BRS 对动态演化过程(在运行时改变用户需求)进行建模和验证的形式化方法技术。我们使用 bigraph 对软件架构进行建模,并描述了支持软件系统动态变化的进化规则。最后,我们使用 BigMC 模型检查工具验证了该模型的属性,并提供了相关的验证程序。
{"title":"Modeling and verification of software evolution using bigraphical reactive system","authors":"Nisha Pal, Dharmendra Kumar Yadav","doi":"10.1007/s10586-024-04597-y","DOIUrl":"https://doi.org/10.1007/s10586-024-04597-y","url":null,"abstract":"<p>Changes are inevitable in software due to technology advancements, and changes in business requirements. Making changes in the software by insertion, deletion or modification of new code may lead to malfunctioning of the old code. Hence, there is a need for a priori analysis to ensure and capture these types of changes to run the software smoothly. Making changes in the software while it is in use is called dynamic evolution. Due to the lack of formal modeling and verification, this dynamic evolution process of software systems has not become prominent. Hence, we used the bigraphical reactive system (BRS) technique to ensure that changes do not break the software functionality (adversely affect the system). BRS provides a powerful framework for modeling, analyzing, and verifying the dynamic evolution of software systems, resulting in ensuring the reliability and correctness of evolving software system. In this paper, we proposed a formal method technique for modeling and verifying the dynamic evolution process (changing user requirements at run time) using the BRS. We used a bigraph to model software architectures and described the evolution rules for supporting the dynamic changes of the software system. Finally, we have used the BigMC model checker tool to validate this model with its properties and provide associated verification procedures.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cluster Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1