首页 > 最新文献

The Journal of Supercomputing最新文献

英文 中文
A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing 基于集合学习和属性加密的语义模型,提高雾计算中智能建筑的安全性
Pub Date : 2024-08-29 DOI: 10.1007/s11227-024-06408-y
Ronita Rezapour, Parvaneh Asghari, Hamid Haj Seyyed Javadi, Shamsollah Ghanbari

Fog computing is a revolutionary technology that, by expanding the cloud computing paradigm to the network edge, brings a significant achievement in the resource-constrained IoT applications in intelligent environments. However, security matters still challenge the extensive deployment of fog computing infrastructure. Ciphertext policy attribute-based encryption prepares a solution for data sharing and security preservation issues in fog-enhanced intelligent environments. Nevertheless, the lack of an effective mechanism to moderate the execution time of CP-ABE schemes due to the diversity of attributes used in secret key and access structure, as well as ensuring data security, practically restricts the deployment of such schemes. In this regard, a collaborative semantic model, including an outsourced CP-ABE scheme with the attribute revocation ability, together with an impressive AES algorithm relying on an ensemble learning system, was proposed in this study. The ensemble learning model uses multiple classifiers, including the GMDH, SVM, and KNN, to specify attributes corresponding to CP-ABE. The Dragonfly algorithm with a semantic leveling method generates outstanding and practical feature subsets. The experimental results on five smart building datasets indicate that the recommended model performs more accurately than existing methods. Also, the encryption, decryption, and attribute revocation execution time are significantly modified with the average time of 1.95, 2.11, and 14.64 ms, respectively, compared to existing works and conducted the scheme’s security.

雾计算是一项革命性技术,它将云计算模式扩展到网络边缘,为智能环境中资源受限的物联网应用带来了重大成就。然而,安全问题仍然是广泛部署雾计算基础设施所面临的挑战。基于密文策略属性的加密为雾增强智能环境中的数据共享和安全保护问题提供了解决方案。然而,由于密钥和访问结构中使用的属性多种多样,CP-ABE 方案缺乏有效的机制来控制执行时间,同时也无法确保数据安全,这实际上限制了此类方案的部署。为此,本研究提出了一种协作语义模型,包括一种具有属性撤销能力的外包 CP-ABE 方案,以及一种依赖于集合学习系统的令人印象深刻的 AES 算法。集合学习模型使用多个分类器,包括 GMDH、SVM 和 KNN,来指定与 CP-ABE 相对应的属性。采用语义分层方法的蜻蜓算法可生成优秀实用的特征子集。在五个智能建筑数据集上的实验结果表明,推荐模型的性能比现有方法更精确。同时,与现有方法相比,加密、解密和属性撤销的执行时间也有了明显改善,平均时间分别为 1.95、2.11 和 14.64 毫秒,并保证了方案的安全性。
{"title":"A semantic model based on ensemble learning and attribute-based encryption to increase security of smart buildings in fog computing","authors":"Ronita Rezapour, Parvaneh Asghari, Hamid Haj Seyyed Javadi, Shamsollah Ghanbari","doi":"10.1007/s11227-024-06408-y","DOIUrl":"https://doi.org/10.1007/s11227-024-06408-y","url":null,"abstract":"<p>Fog computing is a revolutionary technology that, by expanding the cloud computing paradigm to the network edge, brings a significant achievement in the resource-constrained IoT applications in intelligent environments. However, security matters still challenge the extensive deployment of fog computing infrastructure. Ciphertext policy attribute-based encryption prepares a solution for data sharing and security preservation issues in fog-enhanced intelligent environments. Nevertheless, the lack of an effective mechanism to moderate the execution time of CP-ABE schemes due to the diversity of attributes used in secret key and access structure, as well as ensuring data security, practically restricts the deployment of such schemes. In this regard, a collaborative semantic model, including an outsourced CP-ABE scheme with the attribute revocation ability, together with an impressive AES algorithm relying on an ensemble learning system, was proposed in this study. The ensemble learning model uses multiple classifiers, including the GMDH, SVM, and KNN, to specify attributes corresponding to CP-ABE. The Dragonfly algorithm with a semantic leveling method generates outstanding and practical feature subsets. The experimental results on five smart building datasets indicate that the recommended model performs more accurately than existing methods. Also, the encryption, decryption, and attribute revocation execution time are significantly modified with the average time of 1.95, 2.11, and 14.64 ms, respectively, compared to existing works and conducted the scheme’s security.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimized intelligent open-source MLaaS framework for user-friendly clustering and anomaly detection 用于用户友好聚类和异常检测的优化智能开源 MLaaS 框架
Pub Date : 2024-08-29 DOI: 10.1007/s11227-024-06420-2
Kamal A. ElDahshan, Gaber E. Abutaleb, Berihan R. Elemary, Ebeid A. Ebeid, AbdAllah A. AlHabshy

As data grow exponentially, the demand for advanced intelligent solutions has become increasingly urgent. Unfortunately, not all businesses have the expertise to utilize machine learning algorithms effectively. To bridge this gap, the present paper introduces a cost-effective, user-friendly, dependable, adaptable, and scalable solution for visualizing, analyzing, processing, and extracting valuable insights from data. The proposed solution is an optimized open-source unsupervised machine learning as a service (MLaaS) framework that caters to both experts and non-experts in machine learning. The framework aims to assist companies and organizations in solving problems related to clustering and anomaly detection, even without prior experience or internal infrastructure. With a focus on several clustering and anomaly detection techniques, the proposed framework automates data processing while allowing user intervention. The proposed framework includes default algorithms for clustering and outlier detection. In the clustering category, it features three algorithms: k-means, hierarchical clustering, and DBScan clustering. For outlier detection, it includes local outlier factor, K-nearest neighbors, and Gaussian mixture model. Furthermore, the proposed solution is expandable; it may include additional algorithms. It is versatile and capable of handling diverse datasets by generating separate rapid artificial intelligence models for each dataset and facilitating their comparison rapidly. The proposed framework provides a solution through a representational state transfer application programming interface, enabling seamless integration with various systems. Real-world testing of the proposed framework on customer segmentation and fraud detection data demonstrates that it is reliable, efficient, cost-effective, and time-saving. With the innovative MLaaS framework, companies may harness the full potential of business analysis.

随着数据呈指数级增长,对先进智能解决方案的需求日益迫切。遗憾的是,并非所有企业都具备有效利用机器学习算法的专业知识。为了弥补这一差距,本文介绍了一种经济高效、用户友好、可靠、适应性强且可扩展的解决方案,用于可视化、分析、处理数据并从数据中提取有价值的见解。所提出的解决方案是一个优化的开源无监督机器学习即服务(MLaaS)框架,可同时满足机器学习专家和非专家的需求。该框架旨在帮助公司和组织解决与聚类和异常检测相关的问题,即使没有相关经验或内部基础设施也能做到。该框架重点关注几种聚类和异常检测技术,在允许用户干预的同时实现数据处理自动化。建议的框架包括聚类和异常点检测的默认算法。在聚类方面,它有三种算法:K-均值聚类、分层聚类和 DBScan 聚类。在离群点检测方面,它包括局部离群点因子、K-近邻和高斯混合模型。此外,所提出的解决方案具有可扩展性,可以包含其他算法。通过为每个数据集生成单独的快速人工智能模型,并促进它们之间的快速比较,它具有多功能性,能够处理不同的数据集。拟议框架通过表征状态转移应用编程接口提供解决方案,可与各种系统无缝集成。在客户细分和欺诈检测数据上对拟议框架进行的实际测试表明,该框架可靠、高效、成本效益高且节省时间。有了创新的 MLaaS 框架,企业就能充分发挥业务分析的潜力。
{"title":"An optimized intelligent open-source MLaaS framework for user-friendly clustering and anomaly detection","authors":"Kamal A. ElDahshan, Gaber E. Abutaleb, Berihan R. Elemary, Ebeid A. Ebeid, AbdAllah A. AlHabshy","doi":"10.1007/s11227-024-06420-2","DOIUrl":"https://doi.org/10.1007/s11227-024-06420-2","url":null,"abstract":"<p>As data grow exponentially, the demand for advanced intelligent solutions has become increasingly urgent. Unfortunately, not all businesses have the expertise to utilize machine learning algorithms effectively. To bridge this gap, the present paper introduces a cost-effective, user-friendly, dependable, adaptable, and scalable solution for visualizing, analyzing, processing, and extracting valuable insights from data. The proposed solution is an optimized open-source unsupervised machine learning as a service (MLaaS) framework that caters to both experts and non-experts in machine learning. The framework aims to assist companies and organizations in solving problems related to clustering and anomaly detection, even without prior experience or internal infrastructure. With a focus on several clustering and anomaly detection techniques, the proposed framework automates data processing while allowing user intervention. The proposed framework includes default algorithms for clustering and outlier detection. In the clustering category, it features three algorithms: k-means, hierarchical clustering, and DBScan clustering. For outlier detection, it includes local outlier factor, K-nearest neighbors, and Gaussian mixture model. Furthermore, the proposed solution is expandable; it may include additional algorithms. It is versatile and capable of handling diverse datasets by generating separate rapid artificial intelligence models for each dataset and facilitating their comparison rapidly. The proposed framework provides a solution through a representational state transfer application programming interface, enabling seamless integration with various systems. Real-world testing of the proposed framework on customer segmentation and fraud detection data demonstrates that it is reliable, efficient, cost-effective, and time-saving. With the innovative MLaaS framework, companies may harness the full potential of business analysis.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"116 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks 物联网网络异常入侵检测中高效特征选择的混合方法
Pub Date : 2024-08-29 DOI: 10.1007/s11227-024-06409-x
Aya G. Ayad, Nehal A. Sakr, Noha A. Hikal

The exponential growth of Internet of Things (IoT) devices underscores the need for robust security measures against cyber-attacks. Extensive research in the IoT security community has centered on effective traffic detection models, with a particular focus on anomaly intrusion detection systems (AIDS). This paper specifically addresses the preprocessing stage for IoT datasets and feature selection approaches to reduce the complexity of the data. The goal is to develop an efficient AIDS that strikes a balance between high accuracy and low detection time. To achieve this goal, we propose a hybrid feature selection approach that combines filter and wrapper methods. This approach is integrated into a two-level anomaly intrusion detection system. At level 1, our approach classifies network packets into normal or attack, with level 2 further classifying the attack to determine its specific category. One critical aspect we consider is the imbalance in these datasets, which is addressed using the Synthetic Minority Over-sampling Technique (SMOTE). To evaluate how the selected features affect the performance of the machine learning model across different algorithms, namely Decision Tree, Random Forest, Gaussian Naive Bayes, and k-Nearest Neighbor, we employ benchmark datasets: BoT-IoT, TON-IoT, and CIC-DDoS2019. Evaluation metrics encompass detection accuracy, precision, recall, and F1-score. Results indicate that the decision tree achieves high detection accuracy, ranging between 99.82 and 100%, with short detection times ranging between 0.02 and 0.15 s, outperforming existing AIDS architectures for IoT networks and establishing its superiority in achieving both accuracy and efficient detection times.

物联网(IoT)设备的指数级增长凸显了采取强有力的安全措施防范网络攻击的必要性。物联网安全领域的大量研究都集中在有效的流量检测模型上,尤其关注异常入侵检测系统(AIDS)。本文专门讨论了物联网数据集的预处理阶段以及降低数据复杂性的特征选择方法。我们的目标是开发一种高效的艾滋病检测系统,在高准确率和低检测时间之间取得平衡。为了实现这一目标,我们提出了一种混合特征选择方法,它结合了过滤器和包装方法。这种方法被集成到一个两级异常入侵检测系统中。在第一级,我们的方法将网络数据包分类为正常或攻击,第二级进一步对攻击进行分类,以确定其具体类别。我们考虑的一个重要方面是这些数据集中的不平衡,我们使用合成少数群体过度采样技术(SMOTE)来解决这个问题。为了评估所选特征如何影响机器学习模型在决策树、随机森林、高斯直觉贝叶斯和 k 近邻等不同算法中的性能,我们采用了基准数据集:我们采用了基准数据集:BoT-IoT、TON-IoT 和 CIC-DDoS2019。评估指标包括检测准确率、精确度、召回率和 F1 分数。结果表明,决策树实现了较高的检测准确率(介于 99.82 和 100%之间)和较短的检测时间(介于 0.02 和 0.15 秒之间),优于物联网网络中现有的 AIDS 架构,并确立了其在实现准确率和高效检测时间方面的优势。
{"title":"A hybrid approach for efficient feature selection in anomaly intrusion detection for IoT networks","authors":"Aya G. Ayad, Nehal A. Sakr, Noha A. Hikal","doi":"10.1007/s11227-024-06409-x","DOIUrl":"https://doi.org/10.1007/s11227-024-06409-x","url":null,"abstract":"<p>The exponential growth of Internet of Things (IoT) devices underscores the need for robust security measures against cyber-attacks. Extensive research in the IoT security community has centered on effective traffic detection models, with a particular focus on anomaly intrusion detection systems (AIDS). This paper specifically addresses the preprocessing stage for IoT datasets and feature selection approaches to reduce the complexity of the data. The goal is to develop an efficient AIDS that strikes a balance between high accuracy and low detection time. To achieve this goal, we propose a hybrid feature selection approach that combines filter and wrapper methods. This approach is integrated into a two-level anomaly intrusion detection system. At level 1, our approach classifies network packets into normal or attack, with level 2 further classifying the attack to determine its specific category. One critical aspect we consider is the imbalance in these datasets, which is addressed using the Synthetic Minority Over-sampling Technique (SMOTE). To evaluate how the selected features affect the performance of the machine learning model across different algorithms, namely Decision Tree, Random Forest, Gaussian Naive Bayes, and k-Nearest Neighbor, we employ benchmark datasets: BoT-IoT, TON-IoT, and CIC-DDoS2019. Evaluation metrics encompass detection accuracy, precision, recall, and F1-score. Results indicate that the decision tree achieves high detection accuracy, ranging between 99.82 and 100%, with short detection times ranging between 0.02 and 0.15 s, outperforming existing AIDS architectures for IoT networks and establishing its superiority in achieving both accuracy and efficient detection times.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"122 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph neural network-based attention mechanism to classify spam review over heterogeneous social networks 基于图神经网络的注意力机制,对异构社交网络上的垃圾评论进行分类
Pub Date : 2024-08-29 DOI: 10.1007/s11227-024-06459-1
Monti Babulal Pal, Sanjay Agrawal

Graph Neural Networks (GNNs) models, a current machine learning hotspot, have increasingly started to be applied in fraud detection in conjunction with user reviews in recent years. The accessible material is complicated and varied, the aggregated user evaluations cover a diverse range of topics, and erroneous information among vast amounts of user-generated content is typically rare. The review system is modeled as a heterogeneous network to address the issue of feature heterogeneity and uneven data distribution, and a new social theory-based graphical neural network model (SGNN) is suggested. The rich user behavior information in the heterogeneous network may be fully leveraged to acquire richer semantic representations for comments by integrating the hierarchical attention structure. Under the ensemble learning bagging framework, various distinct SGNN sub-models are combined. The sampling technique realizes the diversity aggregation of the base learners, which reduces the loss of useful information and improves the ability to identify bogus comments. According to testing results on real datasets from Amazon and YelpChi, the SGNN approach provides strong anomaly detection performance. It is demonstrated that the SGNN process has good robustness against fraudulent entities in the use of skewed distribution of data categories when compared to the existing approach.

图神经网络(GNN)模型是当前机器学习的热点,近年来越来越多地开始结合用户评论应用于欺诈检测。可访问的资料复杂多样,汇总的用户评价涵盖各种主题,而在海量用户生成的内容中,错误信息通常很少见。为了解决特征异构和数据分布不均的问题,我们将评论系统建模为一个异构网络,并提出了一种新的基于社会理论的图神经网络模型(SGNN)。通过整合分层注意力结构,可以充分利用异构网络中丰富的用户行为信息,获取更丰富的评论语义表征。在集合学习(ensemble learning bagging)框架下,各种不同的 SGNN 子模型被组合在一起。采样技术实现了基础学习器的多样性聚合,从而减少了有用信息的损失,提高了识别虚假评论的能力。根据亚马逊和 YelpChi 真实数据集的测试结果,SGNN 方法具有很强的异常检测性能。结果表明,与现有方法相比,SGNN 方法在使用数据类别偏斜分布时对欺诈实体具有良好的鲁棒性。
{"title":"Graph neural network-based attention mechanism to classify spam review over heterogeneous social networks","authors":"Monti Babulal Pal, Sanjay Agrawal","doi":"10.1007/s11227-024-06459-1","DOIUrl":"https://doi.org/10.1007/s11227-024-06459-1","url":null,"abstract":"<p>Graph Neural Networks (GNNs) models, a current machine learning hotspot, have increasingly started to be applied in fraud detection in conjunction with user reviews in recent years. The accessible material is complicated and varied, the aggregated user evaluations cover a diverse range of topics, and erroneous information among vast amounts of user-generated content is typically rare. The review system is modeled as a heterogeneous network to address the issue of feature heterogeneity and uneven data distribution, and a new social theory-based graphical neural network model (SGNN) is suggested. The rich user behavior information in the heterogeneous network may be fully leveraged to acquire richer semantic representations for comments by integrating the hierarchical attention structure. Under the ensemble learning bagging framework, various distinct SGNN sub-models are combined. The sampling technique realizes the diversity aggregation of the base learners, which reduces the loss of useful information and improves the ability to identify bogus comments. According to testing results on real datasets from Amazon and YelpChi, the SGNN approach provides strong anomaly detection performance. It is demonstrated that the SGNN process has good robustness against fraudulent entities in the use of skewed distribution of data categories when compared to the existing approach.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"88 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved dung beetle optimizer for UAV 3D path planning 用于无人机 3D 路径规划的改进型蜣螂优化器
Pub Date : 2024-08-28 DOI: 10.1007/s11227-024-06414-0
Qi Chen, Yajie Wang, Yunfei Sun

UAV path planning poses the challenge of determining the most efficient route from an initial location to a desired destination, while considering mission objectives and adhering to various flight restrictions. This is a challenging optimization problem with high dimensionality that demands efficient path planning methods. To tackle the intricate UAV path planning problem within complex 3D environments, we propose an improved dung beetle optimizer (IDBO) for UAV path planning. Firstly, we formulate a cost function that converts the UAV path planning problem into a multidimensional function optimization problem, considering both trajectory restrictions and safety restrictions of the UAV. This enables us to effectively search for the optimal path. Secondly, we introduce a chaotic strategy to initialize the population, ensuring a comprehensive exploration of the solution space and enhancing population diversity. Additionally, we incorporate exponentially decreasing inertia weights into the algorithm, which improves convergence speed and exploration capability. Furthermore, to tackle the issue of decreasing population diversity during the late stages of convergence, we employ an adaptive Cauchy mutation strategy to enhance population diversity. Through simulation results, we demonstrate that IDBO achieves faster convergence and generates better paths compared to existing approaches in the same environment. These results demonstrate the remarkable efficacy of the proposed improved algorithm in effectively tackling the UAV path planning problem.

无人机路径规划面临的挑战是,在考虑任务目标和遵守各种飞行限制的同时,确定从初始位置到所需目的地的最有效路径。这是一个具有挑战性的高维优化问题,需要高效的路径规划方法。为了解决复杂三维环境中错综复杂的无人机路径规划问题,我们提出了一种用于无人机路径规划的改进蜣螂优化器(IDBO)。首先,我们制定了一个成本函数,将无人机路径规划问题转化为一个多维函数优化问题,同时考虑无人机的轨迹限制和安全限制。这使我们能够有效地搜索最优路径。其次,我们引入了混沌策略来初始化种群,确保全面探索解空间并提高种群多样性。此外,我们在算法中加入了指数递减惯性权重,从而提高了收敛速度和探索能力。此外,为了解决收敛后期种群多样性下降的问题,我们采用了自适应考奇突变策略来增强种群多样性。通过模拟结果,我们证明了在相同环境下,与现有方法相比,IDBO 实现了更快的收敛速度,并生成了更好的路径。这些结果证明了所提出的改进算法在有效解决无人机路径规划问题方面的显著功效。
{"title":"An improved dung beetle optimizer for UAV 3D path planning","authors":"Qi Chen, Yajie Wang, Yunfei Sun","doi":"10.1007/s11227-024-06414-0","DOIUrl":"https://doi.org/10.1007/s11227-024-06414-0","url":null,"abstract":"<p>UAV path planning poses the challenge of determining the most efficient route from an initial location to a desired destination, while considering mission objectives and adhering to various flight restrictions. This is a challenging optimization problem with high dimensionality that demands efficient path planning methods. To tackle the intricate UAV path planning problem within complex 3D environments, we propose an improved dung beetle optimizer (IDBO) for UAV path planning. Firstly, we formulate a cost function that converts the UAV path planning problem into a multidimensional function optimization problem, considering both trajectory restrictions and safety restrictions of the UAV. This enables us to effectively search for the optimal path. Secondly, we introduce a chaotic strategy to initialize the population, ensuring a comprehensive exploration of the solution space and enhancing population diversity. Additionally, we incorporate exponentially decreasing inertia weights into the algorithm, which improves convergence speed and exploration capability. Furthermore, to tackle the issue of decreasing population diversity during the late stages of convergence, we employ an adaptive Cauchy mutation strategy to enhance population diversity. Through simulation results, we demonstrate that IDBO achieves faster convergence and generates better paths compared to existing approaches in the same environment. These results demonstrate the remarkable efficacy of the proposed improved algorithm in effectively tackling the UAV path planning problem.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"91 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing connectivity: a novel AI approach to assess transmission levels in optical networks 优化连接:评估光网络传输水平的新型人工智能方法
Pub Date : 2024-08-28 DOI: 10.1007/s11227-024-06410-4
Mehaboob Mujawar, S. Manikandan, Monica Kalbande, Puneet Kumar Aggarwal, Nallam Krishnaiah, Yasin Genc

Introducing a novel approach for assessing connectivity in dynamic optical networks, we propose the quantum-driven particle swarm-optimized self-adaptive support vector machine (QPSO-SASVM) model. By integrating quantum computing and machine learning, this advanced framework offers enhanced convergence and robustness. Tested against a network simulation with 187 nodes and 96 DWDM channels, QPSO-SASVM outperforms traditional benchmarks such as LSTM, Naive method, E-DLSTM, and GRU. Evaluation using metrics such as signal-to-noise ratio, ROC curve, RMSE, and R2 consistently demonstrates superior predictive accuracy and adaptability. These results underscore QPSO-SASVM as a powerful tool for precise and reliable prediction in dynamic optical network environments.

我们提出了量子驱动的粒子群优化自适应支持向量机(QPSO-SASVM)模型,为评估动态光网络的连通性引入了一种新方法。通过整合量子计算和机器学习,这一先进的框架具有更强的收敛性和鲁棒性。通过对 187 个节点和 96 个 DWDM 信道的网络模拟进行测试,QPSO-SASVM 优于 LSTM、Naive 方法、E-DLSTM 和 GRU 等传统基准。使用信噪比、ROC 曲线、RMSE 和 R2 等指标进行的评估一致表明,QPSO-SASVM 具有出色的预测准确性和适应性。这些结果表明,QPSO-SASVM 是在动态光网络环境中进行精确可靠预测的有力工具。
{"title":"Optimizing connectivity: a novel AI approach to assess transmission levels in optical networks","authors":"Mehaboob Mujawar, S. Manikandan, Monica Kalbande, Puneet Kumar Aggarwal, Nallam Krishnaiah, Yasin Genc","doi":"10.1007/s11227-024-06410-4","DOIUrl":"https://doi.org/10.1007/s11227-024-06410-4","url":null,"abstract":"<p>Introducing a novel approach for assessing connectivity in dynamic optical networks, we propose the quantum-driven particle swarm-optimized self-adaptive support vector machine (QPSO-SASVM) model. By integrating quantum computing and machine learning, this advanced framework offers enhanced convergence and robustness. Tested against a network simulation with 187 nodes and 96 DWDM channels, QPSO-SASVM outperforms traditional benchmarks such as LSTM, Naive method, E-DLSTM, and GRU. Evaluation using metrics such as signal-to-noise ratio, ROC curve, RMSE, and <i>R</i><sup>2</sup> consistently demonstrates superior predictive accuracy and adaptability. These results underscore QPSO-SASVM as a powerful tool for precise and reliable prediction in dynamic optical network environments.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-layer collaborative task offloading optimization: balancing competition and cooperation across local edge and cloud resources 多层协作任务卸载优化:平衡本地边缘和云资源之间的竞争与合作
Pub Date : 2024-08-28 DOI: 10.1007/s11227-024-06448-4
Bowen Ling, Xiaoheng Deng, Yuning Huang, Jingjing Zhang, JinSong Gui, Yurong Qian

With the explosive growth of electronic information technology, mobile devices generate massive amounts of data and requirements, which poses a significant challenge to mobile devices with limited computing and battery capacity. Task offloading can transfer computing-intensive tasks from resource-constrained mobile devices to resource-rich servers, thereby significantly reducing the consumption of task execution. How to optimize the task offloading strategy in complex environments with multi-layers and multi-devices to improve efficiency becomes a challenge for the task offloading problem. We optimize the vertical assignment of tasks in a multi-layer system using deep reinforcement learning algorithms, which encompass the cloud, edge, and device layers. To balance the load among multiple devices, we employ the KNN algorithm. Subsequently, we introduce a task state discrimination method based on fuzzy control theory to enhance the performance of computing nodes under high load conditions. By optimizing task offloading policies and execution orders, we successfully reduce the average task execution time and energy consumption of mobile devices. We implemented the proposed algorithm in the PureEdgeSim simulator and performed simulations using different device densities to verify the algorithm’s scalability. The simulation results show that the method we proposed outperforms the methods in previous work. Our method can significantly improve performance in high-device density scenarios.

随着电子信息技术的爆炸式增长,移动设备产生了海量数据和需求,这给计算能力和电池容量有限的移动设备带来了巨大挑战。任务卸载可以将计算密集型任务从资源有限的移动设备转移到资源丰富的服务器上,从而大大降低任务执行的消耗。如何在多层多设备的复杂环境中优化任务卸载策略以提高效率,成为任务卸载问题面临的挑战。我们利用深度强化学习算法优化了多层系统中的任务垂直分配,其中包括云层、边缘层和设备层。为了平衡多个设备之间的负载,我们采用了 KNN 算法。随后,我们引入了一种基于模糊控制理论的任务状态判别方法,以提高计算节点在高负载条件下的性能。通过优化任务卸载策略和执行顺序,我们成功地减少了移动设备的平均任务执行时间和能耗。我们在 PureEdgeSim 仿真器中实现了所提出的算法,并使用不同的设备密度进行了仿真,以验证算法的可扩展性。仿真结果表明,我们提出的方法优于之前的方法。我们的方法可以大大提高高设备密度场景下的性能。
{"title":"Multi-layer collaborative task offloading optimization: balancing competition and cooperation across local edge and cloud resources","authors":"Bowen Ling, Xiaoheng Deng, Yuning Huang, Jingjing Zhang, JinSong Gui, Yurong Qian","doi":"10.1007/s11227-024-06448-4","DOIUrl":"https://doi.org/10.1007/s11227-024-06448-4","url":null,"abstract":"<p>With the explosive growth of electronic information technology, mobile devices generate massive amounts of data and requirements, which poses a significant challenge to mobile devices with limited computing and battery capacity. Task offloading can transfer computing-intensive tasks from resource-constrained mobile devices to resource-rich servers, thereby significantly reducing the consumption of task execution. How to optimize the task offloading strategy in complex environments with multi-layers and multi-devices to improve efficiency becomes a challenge for the task offloading problem. We optimize the vertical assignment of tasks in a multi-layer system using deep reinforcement learning algorithms, which encompass the cloud, edge, and device layers. To balance the load among multiple devices, we employ the KNN algorithm. Subsequently, we introduce a task state discrimination method based on fuzzy control theory to enhance the performance of computing nodes under high load conditions. By optimizing task offloading policies and execution orders, we successfully reduce the average task execution time and energy consumption of mobile devices. We implemented the proposed algorithm in the PureEdgeSim simulator and performed simulations using different device densities to verify the algorithm’s scalability. The simulation results show that the method we proposed outperforms the methods in previous work. Our method can significantly improve performance in high-device density scenarios.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"100 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CiPN-TP: a channel-independent pretrained network via tokenized patching for trajectory prediction CiPN-TP:通过标记化修补进行轨迹预测的独立于信道的预训练网络
Pub Date : 2024-08-28 DOI: 10.1007/s11227-024-06462-6
Qifan Xue, Feng Yang, Shengyi Li, Xuanpeng Li, Guangyu Li, Weigong Zhang

Trajectory prediction is highly essential for accurate navigation. Existing deep learning-based approaches always encounter serious performance degradation when facing shifted data or unseen scenarios. For learning transferable representations across different scenarios, the promising pretraining technique is applied to trajectory prediction tasks. However, relevant studies employ point-level masking mechanisms, which cannot capture local motion information across multiple time steps. Additionally, for trajectory data that couples multiple motion states, extracting the temporal dependencies within each state sequence remains highly challenging. To tackle this issue, we propose a channel-independent pretrained network via tokenized patching for efficient vehicle trajectory prediction, and it is composed of tokenized patch masking, channel-independent extractor (CiE), and state decoupling-mixing (SDM). Specifically, first of all, based on the designed tokenized patching scheme, TPM is established to represent local information and long-term relations in masked sequences. Then, through a series of weight-shared dense layers, CiE is designed to capture the individual dependencies among state sequences in an unsupervised pretraining manner. Moreover, by decoupling the complicated trajectory into pseudo-state representations, SDM is proposed to independently reconstruct the state sequences and further carry out representation mixing operations, to realize available trajectory predictions. Finally, extensive experiments show that our framework is effective and achieves the state-of-the-art performance on the INTERACTION and Argoverse2 datasets.

轨迹预测对于精确导航至关重要。现有的基于深度学习的方法在面对偏移数据或未见场景时总是会出现严重的性能下降。为了在不同场景中学习可迁移的表征,有前景的预训练技术被应用于轨迹预测任务。然而,相关研究采用的是点级屏蔽机制,无法捕捉跨多个时间步的局部运动信息。此外,对于包含多个运动状态的轨迹数据,提取每个状态序列中的时间依赖性仍然极具挑战性。为解决这一问题,我们提出了一种通过标记化补丁实现高效车辆轨迹预测的独立于信道的预训练网络,它由标记化补丁屏蔽、独立于信道的提取器(CiE)和状态解耦混合(SDM)组成。具体来说,首先,基于所设计的标记化补丁方案,建立 TPM 来表示屏蔽序列中的局部信息和长期关系。然后,通过一系列权重共享的密集层,设计出 CiE,以无监督预训练的方式捕捉状态序列之间的个体依赖关系。此外,通过将复杂的轨迹解耦为伪状态表示,SDM 被提出来独立重构状态序列并进一步进行表示混合操作,从而实现可用的轨迹预测。最后,大量实验表明,我们的框架是有效的,并在 INTERACTION 和 Argoverse2 数据集上实现了最先进的性能。
{"title":"CiPN-TP: a channel-independent pretrained network via tokenized patching for trajectory prediction","authors":"Qifan Xue, Feng Yang, Shengyi Li, Xuanpeng Li, Guangyu Li, Weigong Zhang","doi":"10.1007/s11227-024-06462-6","DOIUrl":"https://doi.org/10.1007/s11227-024-06462-6","url":null,"abstract":"<p>Trajectory prediction is highly essential for accurate navigation. Existing deep learning-based approaches always encounter serious performance degradation when facing shifted data or unseen scenarios. For learning transferable representations across different scenarios, the promising pretraining technique is applied to trajectory prediction tasks. However, relevant studies employ point-level masking mechanisms, which cannot capture local motion information across multiple time steps. Additionally, for trajectory data that couples multiple motion states, extracting the temporal dependencies within each state sequence remains highly challenging. To tackle this issue, we propose a channel-independent pretrained network via tokenized patching for efficient vehicle trajectory prediction, and it is composed of tokenized patch masking, channel-independent extractor (CiE), and state decoupling-mixing (SDM). Specifically, first of all, based on the designed tokenized patching scheme, TPM is established to represent local information and long-term relations in masked sequences. Then, through a series of weight-shared dense layers, CiE is designed to capture the individual dependencies among state sequences in an unsupervised pretraining manner. Moreover, by decoupling the complicated trajectory into pseudo-state representations, SDM is proposed to independently reconstruct the state sequences and further carry out representation mixing operations, to realize available trajectory predictions. Finally, extensive experiments show that our framework is effective and achieves the state-of-the-art performance on the INTERACTION and Argoverse2 datasets.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robustness Analysis of Public Transportation Systems in Seoul Using General Multilayer Network Models 利用通用多层网络模型分析首尔公共交通系统的鲁棒性
Pub Date : 2024-08-28 DOI: 10.1007/s11227-024-06404-2
Seokjin Lee, Seongryong Kim, Jungeun Kim

Public transportation systems play a vital role in modern cities, enhancing the quality of life and fostering sustainable economic growth. Modeling and understanding the complexities of these transportation networks are crucial for effective urban planning and management. Traditional models often fall short in capturing the intricate interactions and interdependencies in multimodal public transportation systems. To address this challenge, recent research has embraced multilayer network models, offering a more sophisticated representation of these networks. However, there is a need to explore and develop robustness analysis techniques tailored to these general multilayer networks to fully assess their complexities in real-world scenarios. In this paper, we employ a general multilayer network model to comprehensively analyze a real-world multimodal transportation network in Seoul, South Korea. We leverage a large volume of traffic data to model, visualize, and evaluate the city’s mobility patterns. Additionally, we introduce two novel methodologies for robustness analysis, one based on random walk coverage and the other on eigenvalue, specifically designed for general multilayer networks. Extensive experiments using the large volume of real-world data sets demonstrate the effectiveness of the proposed approaches.

公共交通系统在现代城市中发挥着至关重要的作用,它能提高生活质量,促进可持续经济增长。建立模型并理解这些交通网络的复杂性对于有效的城市规划和管理至关重要。传统模型往往无法捕捉到多模式公共交通系统中错综复杂的相互作用和相互依存关系。为了应对这一挑战,最近的研究采用了多层网络模型,为这些网络提供了更复杂的表示方法。然而,我们需要探索和开发针对这些通用多层网络的稳健性分析技术,以全面评估其在现实世界中的复杂性。在本文中,我们采用了通用多层网络模型来全面分析韩国首尔真实世界中的多式联运网络。我们利用大量交通数据对城市交通模式进行建模、可视化和评估。此外,我们还引入了两种新颖的鲁棒性分析方法,一种基于随机行走覆盖率,另一种基于特征值,专为一般多层网络而设计。使用大量真实世界数据集进行的广泛实验证明了所建议方法的有效性。
{"title":"Robustness Analysis of Public Transportation Systems in Seoul Using General Multilayer Network Models","authors":"Seokjin Lee, Seongryong Kim, Jungeun Kim","doi":"10.1007/s11227-024-06404-2","DOIUrl":"https://doi.org/10.1007/s11227-024-06404-2","url":null,"abstract":"<p>Public transportation systems play a vital role in modern cities, enhancing the quality of life and fostering sustainable economic growth. Modeling and understanding the complexities of these transportation networks are crucial for effective urban planning and management. Traditional models often fall short in capturing the intricate interactions and interdependencies in multimodal public transportation systems. To address this challenge, recent research has embraced multilayer network models, offering a more sophisticated representation of these networks. However, there is a need to explore and develop robustness analysis techniques tailored to these general multilayer networks to fully assess their complexities in real-world scenarios. In this paper, we employ a general multilayer network model to comprehensively analyze a real-world multimodal transportation network in Seoul, South Korea. We leverage a large volume of traffic data to model, visualize, and evaluate the city’s mobility patterns. Additionally, we introduce two novel methodologies for robustness analysis, one based on random walk coverage and the other on eigenvalue, specifically designed for general multilayer networks. Extensive experiments using the large volume of real-world data sets demonstrate the effectiveness of the proposed approaches.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"88 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and efficient general matrix multiplication on cloud using homomorphic encryption 使用同态加密在云上安全高效地进行通用矩阵乘法运算
Pub Date : 2024-08-26 DOI: 10.1007/s11227-024-06428-8
Yang Gao, Gang Quan, Soamar Homsi, Wujie Wen, Liqiang Wang

Despite the enormous technical and financial advantages of cloud computing, security and privacy have always been the primary concerns for adopting cloud computing facilities, especially for government agencies and commercial sectors with high-security requirements. Homomorphic encryption (HE) has recently emerged as an effective tool in ensuring privacy and security for sensitive applications by allowing computing on encrypted data. One major obstacle to employing HE-based computation, however, is its excessive computational cost, which can be orders of magnitude higher than its counterpart based on the plaintext. In this paper, we study the problem of how to reduce the HE-based computational cost for general matrix multiplication, i.e., a fundamental building block for numerous practical applications, by taking advantage of the single instruction multiple data operations supported by HE schemes. Specifically, we develop a novel element-wise algorithm for general matrix multiplication, based on which we propose two HE-based general matrix multiplication algorithms to reduce the HE computation cost. Our experimental results show that our algorithms significantly outperform the state-of-the-art approaches of HE-based matrix multiplication.

尽管云计算具有巨大的技术和经济优势,但安全和隐私一直是采用云计算设施的首要问题,尤其是对具有高安全要求的政府机构和商业部门而言。同态加密(HE)允许对加密数据进行计算,是确保敏感应用隐私和安全的有效工具。然而,采用基于 HE 的计算的一个主要障碍是计算成本过高,可能比基于明文的计算成本高出几个数量级。在本文中,我们研究了如何利用 HE 方案支持的单指令多数据操作,降低基于 HE 的通用矩阵乘法计算成本的问题。具体来说,我们开发了一种新颖的通用矩阵乘法按元素计算的算法,并在此基础上提出了两种基于 HE 的通用矩阵乘法算法,以降低 HE 计算成本。实验结果表明,我们的算法明显优于最先进的基于 HE 的矩阵乘法方法。
{"title":"Secure and efficient general matrix multiplication on cloud using homomorphic encryption","authors":"Yang Gao, Gang Quan, Soamar Homsi, Wujie Wen, Liqiang Wang","doi":"10.1007/s11227-024-06428-8","DOIUrl":"https://doi.org/10.1007/s11227-024-06428-8","url":null,"abstract":"<p>Despite the enormous technical and financial advantages of cloud computing, security and privacy have always been the primary concerns for adopting cloud computing facilities, especially for government agencies and commercial sectors with high-security requirements. Homomorphic encryption (HE) has recently emerged as an effective tool in ensuring privacy and security for sensitive applications by allowing computing on encrypted data. One major obstacle to employing HE-based computation, however, is its excessive computational cost, which can be orders of magnitude higher than its counterpart based on the plaintext. In this paper, we study the problem of how to reduce the HE-based computational cost for general matrix multiplication, i.e., a fundamental building block for numerous practical applications, by taking advantage of the single instruction multiple data operations supported by HE schemes. Specifically, we develop a novel element-wise algorithm for general matrix multiplication, based on which we propose two HE-based general matrix multiplication algorithms to reduce the HE computation cost. Our experimental results show that our algorithms significantly outperform the state-of-the-art approaches of HE-based matrix multiplication.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The Journal of Supercomputing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1