首页 > 最新文献

IEEE Transactions on Mobile Computing最新文献

英文 中文
LI2: A New Learning-Based Approach to Timely Monitoring of Points-of-Interest With UAV LI2: 利用无人机及时监测兴趣点的基于学习的新方法
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1109/TMC.2024.3461708
Ziyao Huang;Weiwei Wu;Kui Wu;Hang Yuan;Chenchen Fu;Feng Shan;Jianping Wang;Junzhou Luo
Unmanned aerial vehicles (UAVs) play a critical role in disaster response, swiftly gathering information from various points-of-interest (PoIs) across extensive areas. The freshness of this information is measured by the age of information (AoI), representing the time since the latest information acquisition of a specific PoI. However, devising AoI-minimizing routes for UAVs in obstructed post-disaster environments poses unique challenges that have yet to be fully overcome. Obstacles, like post-disaster barriers, can impede direct flight paths between PoIs, and limited battery life requires energy-conscious route planning. Additionally, existing solutions fail to universally minimize varying data freshness requirements. This research addresses the AoI-driven UAV travel problem, seeking to establish periodic routes that optimize AoI metrics while considering energy and general graph constraints. We develop a learning-based algorithm to enhance the current route iteratively, utilizing guidance from a deep reinforcement learning (DRL) agent and executing a series of operations to potentially decrease AoI while adhering to topological and energy constraints. The algorithm is validated on real post-disaster datasets, demonstrating significant improvements in various AoI metrics compared to other learning-based approaches. Furthermore, our algorithm outperforms approximation algorithms and can approach the global optimum when tailored to existing AoI-minimizing problems.
无人驾驶飞行器(uav)在灾难响应中发挥着至关重要的作用,可以从广泛地区的各个兴趣点(poi)快速收集信息。该信息的新鲜度是通过信息年龄(AoI)来度量的,AoI表示自获取特定PoI的最新信息以来的时间。然而,为无人机在受阻的灾后环境中设计最小化aoi的路线提出了尚未完全克服的独特挑战。障碍物,比如灾后屏障,可能会阻碍飞机在不同地点之间的直接飞行路径,而且有限的电池寿命需要有节能意识的路线规划。此外,现有的解决方案无法普遍地最小化不同的数据新鲜度需求。本研究解决了AoI驱动的无人机飞行问题,在考虑能量和一般图约束的情况下,寻求建立优化AoI指标的周期性路线。我们开发了一种基于学习的算法来迭代增强当前路径,利用深度强化学习(DRL)代理的指导,并执行一系列操作来潜在地降低AoI,同时遵守拓扑和能量约束。该算法在真实的灾后数据集上进行了验证,与其他基于学习的方法相比,该算法在各种AoI指标上有了显着改善。此外,我们的算法优于近似算法,当针对现有的aoi最小化问题进行定制时,可以接近全局最优。
{"title":"LI2: A New Learning-Based Approach to Timely Monitoring of Points-of-Interest With UAV","authors":"Ziyao Huang;Weiwei Wu;Kui Wu;Hang Yuan;Chenchen Fu;Feng Shan;Jianping Wang;Junzhou Luo","doi":"10.1109/TMC.2024.3461708","DOIUrl":"10.1109/TMC.2024.3461708","url":null,"abstract":"Unmanned aerial vehicles (UAVs) play a critical role in disaster response, swiftly gathering information from various points-of-interest (PoIs) across extensive areas. The freshness of this information is measured by the age of information (AoI), representing the time since the latest information acquisition of a specific PoI. However, devising AoI-minimizing routes for UAVs in obstructed post-disaster environments poses unique challenges that have yet to be fully overcome. Obstacles, like post-disaster barriers, can impede direct flight paths between PoIs, and limited battery life requires energy-conscious route planning. Additionally, existing solutions fail to universally minimize varying data freshness requirements. This research addresses the AoI-driven UAV travel problem, seeking to establish periodic routes that optimize AoI metrics while considering energy and general graph constraints. We develop a learning-based algorithm to enhance the current route iteratively, utilizing guidance from a deep reinforcement learning (DRL) agent and executing a series of operations to potentially decrease AoI while adhering to topological and energy constraints. The algorithm is validated on real post-disaster datasets, demonstrating significant improvements in various AoI metrics compared to other learning-based approaches. Furthermore, our algorithm outperforms approximation algorithms and can approach the global optimum when tailored to existing AoI-minimizing problems.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"45-61"},"PeriodicalIF":7.7,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142257214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FD MU-MIMO Systems: Performance Analysis in the Presence of Imperfect CSI and Non-Ideal Transceivers FD MU-MIMO 系统:不完美 CSI 和非理想收发器情况下的性能分析
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1109/TMC.2024.3462721
Emad Saleh;Malek Alsmadi;Salama Ikki
This work outlines a framework for full-duplex (FD) multiple-input multiple-output (MIMO) communication systems considering practical conditions, such as imperfect channel state information (CSI) and hardware impairments (HWIs). We analyze the performance of FD multi-user (MU) MIMO systems, specifically studying the effects of practical channel estimation errors and HWIs on the spectral efficiency (SE) performance of FD MU-MIMO systems. Maximum ratio combining/maximum ratio transmission (MRC/MRT) and zero-forcing reception/zero-forcing transmission (ZFR/ZFT) linear detectors/precoders are considered at the base station (BS). Moreover, linear minimum mean square error (LMMSE) and least square (LS) error estimation are used to estimate the channel at the BS. Mathematical derivations for the lower bounds of uplink (UL) and downlink (DL) SEs are presented in the context of imperfect CSI and HWIs. Computer simulations validate the analytical derivations. The results demonstrate the tightness of the obtained bounds.
本工作概述了一个考虑实际条件的全双工(FD)多输入多输出(MIMO)通信系统框架,例如不完善的信道状态信息(CSI)和硬件损伤(hwi)。分析了FD多用户(MU) MIMO系统的性能,具体研究了实际信道估计误差和hwi对FD MU-MIMO系统频谱效率(SE)性能的影响。最大比值组合/最大比值传输(MRC/MRT)和零强迫接收/零强迫传输(ZFR/ZFT)线性检测器/预编码器在基站(BS)中被考虑。此外,采用线性最小均方误差(LMMSE)和最小二乘误差(LS)估计信道。在不完全CSI和不完全hwi的情况下,给出了上行(UL)和下行(DL) se下界的数学推导。计算机模拟验证了解析推导。结果表明所得到的边界是严密的。
{"title":"FD MU-MIMO Systems: Performance Analysis in the Presence of Imperfect CSI and Non-Ideal Transceivers","authors":"Emad Saleh;Malek Alsmadi;Salama Ikki","doi":"10.1109/TMC.2024.3462721","DOIUrl":"10.1109/TMC.2024.3462721","url":null,"abstract":"This work outlines a framework for full-duplex (FD) multiple-input multiple-output (MIMO) communication systems considering practical conditions, such as imperfect channel state information (CSI) and hardware impairments (HWIs). We analyze the performance of FD multi-user (MU) MIMO systems, specifically studying the effects of practical channel estimation errors and HWIs on the spectral efficiency (SE) performance of FD MU-MIMO systems. Maximum ratio combining/maximum ratio transmission (MRC/MRT) and zero-forcing reception/zero-forcing transmission (ZFR/ZFT) linear detectors/precoders are considered at the base station (BS). Moreover, linear minimum mean square error (LMMSE) and least square (LS) error estimation are used to estimate the channel at the BS. Mathematical derivations for the lower bounds of uplink (UL) and downlink (DL) SEs are presented in the context of imperfect CSI and HWIs. Computer simulations validate the analytical derivations. The results demonstrate the tightness of the obtained bounds.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"422-434"},"PeriodicalIF":7.7,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142257211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Hop Task Offloading and Relay Selection for IoT Devices in Mobile Edge Computing 移动边缘计算中物联网设备的多跳任务卸载和中继选择
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1109/TMC.2024.3462731
Ting Li;Yinlong Liu;Tao Ouyang;Hangsheng Zhang;Kai Yang;Xu Zhang
To bridge the gap of conventional single-hop task offloading schemes in infrastructure-free scenarios, multi-hop task offloading schemes for IoT devices in Mobile Edge Computing (MEC) are desired to jointly optimize task offloading decisions and routing paths. In this paper, we investigate a hierarchical multi-hop edge computing framework and propose a joint Task Offloading and Relay Selection (TORS) scheme. It considers real-time computation at each relay node and employs directional searches to facilitate the task execution and results reporting at the fastest speed. However, finding the optimal TORS solution is a formidable challenge due to the time-varying network environments, the strong interdependence of decision sets across different time slots, and the high computational complexity. To address these challenges, we first leverage Lyapunov optimization to transform the stochastic TORS problem into a deterministic per-slot block problem, avoiding the need for extensive system prior knowledge. Subsequently, we propose a Soft Actor-Critic (SAC)-based algorithm, SAC-TORS, to find a satisfactory TORS solution with minimal computational complexity in a distributed manner. Accordingly, each IoT device can independently make self-determined and directional decisions with observable network information. Through extensive experiments, we demonstrate that the SAC-TORS outperforms state-of-the-art solutions, achieving performance improvements of up to 66%.
为了弥补传统的单跳任务卸载方案在无基础设施场景下的不足,需要针对移动边缘计算(MEC)的物联网设备的多跳任务卸载方案,共同优化任务卸载决策和路由路径。本文研究了一种分层多跳边缘计算框架,并提出了一种联合任务卸载和中继选择(TORS)方案。它考虑了每个中继节点的实时计算,并采用定向搜索,以最快的速度执行任务和报告结果。然而,由于时变的网络环境、不同时隙间决策集的强相互依赖性以及高计算复杂度,寻找最优tor解是一项艰巨的挑战。为了解决这些挑战,我们首先利用Lyapunov优化将随机tor问题转化为确定性的每槽块问题,避免了对大量系统先验知识的需要。随后,我们提出了一种基于软Actor-Critic (SAC)的算法SAC-TORS,以分布式方式以最小的计算复杂度找到令人满意的tor解。因此,每个物联网设备可以独立地根据可观察到的网络信息进行自我确定和定向决策。通过大量的实验,我们证明SAC-TORS优于最先进的解决方案,实现了高达66%的性能改进。
{"title":"Multi-Hop Task Offloading and Relay Selection for IoT Devices in Mobile Edge Computing","authors":"Ting Li;Yinlong Liu;Tao Ouyang;Hangsheng Zhang;Kai Yang;Xu Zhang","doi":"10.1109/TMC.2024.3462731","DOIUrl":"10.1109/TMC.2024.3462731","url":null,"abstract":"To bridge the gap of conventional single-hop task offloading schemes in infrastructure-free scenarios, multi-hop task offloading schemes for IoT devices in Mobile Edge Computing (MEC) are desired to jointly optimize task offloading decisions and routing paths. In this paper, we investigate a hierarchical multi-hop edge computing framework and propose a joint Task Offloading and Relay Selection (TORS) scheme. It considers real-time computation at each relay node and employs directional searches to facilitate the task execution and results reporting at the fastest speed. However, finding the optimal TORS solution is a formidable challenge due to the time-varying network environments, the strong interdependence of decision sets across different time slots, and the high computational complexity. To address these challenges, we first leverage Lyapunov optimization to transform the stochastic TORS problem into a deterministic per-slot block problem, avoiding the need for extensive system prior knowledge. Subsequently, we propose a Soft Actor-Critic (SAC)-based algorithm, SAC-TORS, to find a satisfactory TORS solution with minimal computational complexity in a distributed manner. Accordingly, each IoT device can independently make self-determined and directional decisions with observable network information. Through extensive experiments, we demonstrate that the SAC-TORS outperforms state-of-the-art solutions, achieving performance improvements of up to 66%.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"466-481"},"PeriodicalIF":7.7,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142257213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Stage Deep Energy Optimization in IRS-Assisted UAV-Based Edge Computing Systems 基于 IRS 的无人机边缘计算系统中的两级深度能量优化
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1109/TMC.2024.3461719
Jianqiu Wu;Zhongyi Yu;Jianxiong Guo;Zhiqing Tang;Tian Wang;Weijia Jia
Integrating wireless-powered Mobile Edge Computing (MEC) with Unmanned Aerial Vehicles (UAVs) leverages computation offloading services for mobile devices, significantly enhancing the mobility and control of MEC networks. However, current research has not focused on customizing system designs for Terahertz (THz) communication networks. When dealing with THz communication, one must account for blockage vulnerability due to severe THz wave propagation attenuation and insufficient diffraction. The Intelligent Reflecting Surface (IRS) can effectively address these limitations in the model, enhancing spectrum efficiency and coverage capabilities while reducing blockage vulnerability in THz networks. In this paper, we introduce an upgraded MEC system that integrates IRS and UAVs into THz communication networks, focusing on a binary offloading policy for studying the computation offloading problem. Our primary objective is to optimize the energy consumption of both UAVs and User Electronic Devices, alongside refining the phase shift of the IRS reflector. The problem is a Mixed Integer Non-Linear Programming problem known as NP-hard. To tackle this challenge, we propose a two-stage deep learning-based optimization framework named Iterative Order-Preserving Policy Optimization (IOPO). Unlike exhaustive search methods, IOPO continually updates offloading decisions through an order-preserving quantization method, thereby accelerating convergence and reducing computational complexity, especially when handling complex problems with extensive solution spaces. The numerical results demonstrate that the proposed algorithm significantly improves energy efficiency and achieves near-optimal performance compared to benchmark methods.
将无线供电的移动边缘计算(MEC)与无人机(uav)集成,可以为移动设备提供计算卸载服务,显著增强MEC网络的移动性和控制力。然而,目前的研究并没有集中在太赫兹(THz)通信网络的定制系统设计。在处理太赫兹通信时,必须考虑太赫兹波传播衰减严重和衍射不足造成的阻塞脆弱性。智能反射面(IRS)可以有效地解决模型中的这些限制,提高频谱效率和覆盖能力,同时减少太赫兹网络中的阻塞脆弱性。本文介绍了一种将IRS和无人机集成到太赫兹通信网络中的升级MEC系统,重点研究了一种二进制卸载策略来研究计算卸载问题。我们的主要目标是优化无人机和用户电子设备的能耗,同时改进IRS反射器的相移。这个问题是一个被称为np困难的混合整数非线性规划问题。为了解决这一挑战,我们提出了一种基于两阶段深度学习的优化框架,称为迭代保序策略优化(IOPO)。与穷举搜索方法不同,IOPO通过保序量化方法不断更新卸载决策,从而加速收敛并降低计算复杂度,特别是在处理具有广泛解空间的复杂问题时。数值结果表明,与基准方法相比,该算法显著提高了能源效率,达到了接近最优的性能。
{"title":"Two-Stage Deep Energy Optimization in IRS-Assisted UAV-Based Edge Computing Systems","authors":"Jianqiu Wu;Zhongyi Yu;Jianxiong Guo;Zhiqing Tang;Tian Wang;Weijia Jia","doi":"10.1109/TMC.2024.3461719","DOIUrl":"10.1109/TMC.2024.3461719","url":null,"abstract":"Integrating wireless-powered Mobile Edge Computing (MEC) with Unmanned Aerial Vehicles (UAVs) leverages computation offloading services for mobile devices, significantly enhancing the mobility and control of MEC networks. However, current research has not focused on customizing system designs for Terahertz (THz) communication networks. When dealing with THz communication, one must account for blockage vulnerability due to severe THz wave propagation attenuation and insufficient diffraction. The Intelligent Reflecting Surface (IRS) can effectively address these limitations in the model, enhancing spectrum efficiency and coverage capabilities while reducing blockage vulnerability in THz networks. In this paper, we introduce an upgraded MEC system that integrates IRS and UAVs into THz communication networks, focusing on a binary offloading policy for studying the computation offloading problem. Our primary objective is to optimize the energy consumption of both UAVs and User Electronic Devices, alongside refining the phase shift of the IRS reflector. The problem is a Mixed Integer Non-Linear Programming problem known as NP-hard. To tackle this challenge, we propose a two-stage deep learning-based optimization framework named Iterative Order-Preserving Policy Optimization (IOPO). Unlike exhaustive search methods, IOPO continually updates offloading decisions through an order-preserving quantization method, thereby accelerating convergence and reducing computational complexity, especially when handling complex problems with extensive solution spaces. The numerical results demonstrate that the proposed algorithm significantly improves energy efficiency and achieves near-optimal performance compared to benchmark methods.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"449-465"},"PeriodicalIF":7.7,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142257210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical-Layer CTC From BLE to Wi-Fi With IEEE 802.11ax 使用 IEEE 802.11ax 从 BLE 到 Wi-Fi 的物理层 CTC
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-17 DOI: 10.1109/TMC.2024.3462941
Demin Gao;Liyuan Ou;Yongrui Chen;Xiuzhen Guo;Ruofeng Liu;Yunhuai Liu;Tian He
Wi-Fi is the de facto standard for providing wireless access to the Internet in the 2.4 GHz ISM band. Tens of billions of Wi-Fi devices (e.g., smartphones) have been shipped worldwide with limited types of wireless radios operating only when Wi-Fi connectivity is available, making it challenging to access data in heterogeneous IoT devices. However, the direct connection between Wireless Personal Area Network (WPAN) technologies, such as Bluetooth, and Wi-Fi presents challenges due to the inherent distinct physical layer. In our work, a novel communication method called BlueWi has been introduced, which serves as a cross technology communication method that enables BLE devices to establish connections and engage in communication with Wi-Fi based WPAN networks. We let BLE signals hitchhike on ongoing Wi-Fi signals, enabling Wi-Fi to recognize specific BLE signal waveforms in the frequency domain. By analyzing the decoded Wi-Fi payload, BlueWi can retrieve the BLE data, ensuring this method remains fully compatible with existing commodity Wi-Fi hardware. The direct sequence spread spectrum scheme is appended to handle general BLE frames and can be considered as “COPY” operation, which allows for better correlation and detection of the signal at the receiver. Evaluations conducted using both USRP and commodity devices have demonstrated that BlueWi can achieve concurrent wireless communication from BLE commercial chips to Wi-Fi networks with a frame reception rate exceeding 96%.
Wi-Fi是在2.4 GHz ISM频段提供无线上网的事实上的标准。数以百亿计的Wi-Fi设备(例如智能手机)已经在全球范围内出货,只有在Wi-Fi连接可用时才能运行有限类型的无线无线电,这使得在异构物联网设备中访问数据变得具有挑战性。然而,无线个人区域网络(WPAN)技术(如蓝牙)与Wi-Fi之间的直接连接由于其固有的不同物理层而面临挑战。在我们的工作中,我们引入了一种名为BlueWi的新型通信方法,它作为一种跨技术通信方法,使BLE设备能够与基于Wi-Fi的WPAN网络建立连接并进行通信。我们让BLE信号搭便车到正在进行的Wi-Fi信号上,使Wi-Fi能够在频域中识别特定的BLE信号波形。通过分析解码后的Wi-Fi有效载荷,BlueWi可以检索BLE数据,确保该方法与现有的商用Wi-Fi硬件完全兼容。附加直接序列扩频方案来处理一般BLE帧,可以认为是“COPY”操作,可以更好地在接收端对信号进行相关和检测。使用USRP和商品设备进行的评估表明,BlueWi可以实现从BLE商用芯片到Wi-Fi网络的并发无线通信,帧接收率超过96%。
{"title":"Physical-Layer CTC From BLE to Wi-Fi With IEEE 802.11ax","authors":"Demin Gao;Liyuan Ou;Yongrui Chen;Xiuzhen Guo;Ruofeng Liu;Yunhuai Liu;Tian He","doi":"10.1109/TMC.2024.3462941","DOIUrl":"10.1109/TMC.2024.3462941","url":null,"abstract":"Wi-Fi is the de facto standard for providing wireless access to the Internet in the 2.4 GHz ISM band. Tens of billions of Wi-Fi devices (e.g., smartphones) have been shipped worldwide with limited types of wireless radios operating only when Wi-Fi connectivity is available, making it challenging to access data in heterogeneous IoT devices. However, the direct connection between Wireless Personal Area Network (WPAN) technologies, such as Bluetooth, and Wi-Fi presents challenges due to the inherent distinct physical layer. In our work, a novel communication method called BlueWi has been introduced, which serves as a cross technology communication method that enables BLE devices to establish connections and engage in communication with Wi-Fi based WPAN networks. We let BLE signals hitchhike on ongoing Wi-Fi signals, enabling Wi-Fi to recognize specific BLE signal waveforms in the frequency domain. By analyzing the decoded Wi-Fi payload, BlueWi can retrieve the BLE data, ensuring this method remains fully compatible with existing commodity Wi-Fi hardware. The direct sequence spread spectrum scheme is appended to handle general BLE frames and can be considered as “\u0000<italic>COPY</i>\u0000” operation, which allows for better correlation and detection of the signal at the receiver. Evaluations conducted using both USRP and commodity devices have demonstrated that BlueWi can achieve concurrent wireless communication from BLE commercial chips to Wi-Fi networks with a frame reception rate exceeding 96%.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"338-351"},"PeriodicalIF":7.7,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142257216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WiPhase: A Human Activity Recognition Approach by Fusing of Reconstructed WiFi CSI Phase Features WiPhase:融合重构 WiFi CSI 相位特征的人类活动识别方法
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-16 DOI: 10.1109/TMC.2024.3461672
Xingcan Chen;Chenglin Li;Chengpeng Jiang;Wei Meng;Wendong Xiao
Human activity recognition (HAR) is an important task in the field of human-computer interaction. Given the penetration of WiFi devices in our daily lives, HAR using WiFi channel state information (CSI) is a more cost-efficient and comfortable approach. However, most existing approaches ignore the correlation between CSI sub-carriers, which makes their models inefficient and need to rely on deeper and more complex networks to further improve performance. To solve these problems, we propose a reconstructed WiFi CSI phase based HAR approach (WiPhase), which contains a two-stream model to fuse both temporal features and sub-carrier correlation features of reconstructed CSI phase. Specifically, a gated pseudo-Siamese network (GPSiam) is designed to capture the temporal features of the reconstructed sparse CSI phase integration representation (CSI-PIR), and a dynamic resolution based graph attention network (DRGAT) is designed to capture the nonlinear correlation between CSI sub-carriers by the reconstructed CSI phase graph. Furthermore, dendrite network (DD) makes the final decision by combining the features output from GPSiam and DRGAT. Experimental results show that WiPhase outperforms the existing state-of-the-art approaches.
人体活动识别(HAR)是人机交互领域的一个重要课题。鉴于WiFi设备在我们日常生活中的渗透,使用WiFi信道状态信息(CSI)的HAR是一种更经济、更舒适的方法。然而,现有的大多数方法忽略了CSI子载波之间的相关性,这使得它们的模型效率低下,需要依赖更深入、更复杂的网络来进一步提高性能。为了解决这些问题,我们提出了一种基于重建WiFi CSI相位的HAR方法(WiPhase),该方法包含一个两流模型来融合重建CSI相位的时间特征和子载波相关特征。具体而言,设计了一种门控伪暹罗网络(GPSiam)来捕获重建的稀疏CSI相位积分表示(CSI- pir)的时间特征,设计了一种基于动态分辨率的图关注网络(DRGAT)来通过重建的CSI相位图来捕获CSI子载波之间的非线性相关性。然后,树突网络(DD)结合GPSiam和DRGAT的特征输出进行最终决策。实验结果表明,WiPhase优于现有的最先进的方法。
{"title":"WiPhase: A Human Activity Recognition Approach by Fusing of Reconstructed WiFi CSI Phase Features","authors":"Xingcan Chen;Chenglin Li;Chengpeng Jiang;Wei Meng;Wendong Xiao","doi":"10.1109/TMC.2024.3461672","DOIUrl":"10.1109/TMC.2024.3461672","url":null,"abstract":"Human activity recognition (HAR) is an important task in the field of human-computer interaction. Given the penetration of WiFi devices in our daily lives, HAR using WiFi channel state information (CSI) is a more cost-efficient and comfortable approach. However, most existing approaches ignore the correlation between CSI sub-carriers, which makes their models inefficient and need to rely on deeper and more complex networks to further improve performance. To solve these problems, we propose a reconstructed WiFi CSI phase based HAR approach (WiPhase), which contains a two-stream model to fuse both temporal features and sub-carrier correlation features of reconstructed CSI phase. Specifically, a gated pseudo-Siamese network (GPSiam) is designed to capture the temporal features of the reconstructed sparse CSI phase integration representation (CSI-PIR), and a dynamic resolution based graph attention network (DRGAT) is designed to capture the nonlinear correlation between CSI sub-carriers by the reconstructed CSI phase graph. Furthermore, dendrite network (DD) makes the final decision by combining the features output from GPSiam and DRGAT. Experimental results show that WiPhase outperforms the existing state-of-the-art approaches.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"394-406"},"PeriodicalIF":7.7,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142257217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P3ID: A Privacy-Preserving Person Identification Framework Towards Multi-Environments Based on Transfer Learning P3ID:基于迁移学习的多环境隐私保护人员识别框架
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-13 DOI: 10.1109/TMC.2024.3459944
Hanxiang He;Xintao Huan;Jing Wang;Yong Luo;Han Hu;Jianping An
Concerns surrounding privacy leakages caused by prevalent vision-based person identifications are countless. A promising privacy-preserving solution is to identify the wireless signals reflecting persons, which, however, faces a major challenge of losing efficacy in multi-environments. In this paper, we work on person identification based on wireless signals using transfer learning, toward tackling the performance deterioration across environments. We investigate the feature variations induced by environmental shifts based on data measurements. Lay our foundation on the feature alignment concept, we propose a novel wireless-based person identification framework using transfer learning. In the framework, we integrate a series of signal processing methods including signal selection, pre-processing, and augmentation, where the first includes a reference environment to assist the feature extraction while the latter two respectively reduce the data noise and improve the data diversity. We also propose a model generalization method where a neural network is employed to align features from different environments, which facilitates the extraction of environment-independent features while incorporating both person and environment information. On a real wireless testbed consisting of an Impulse Radio Ultra-WideBand (IR-UWB) radar, we build and publicly release a dataset with 22,264 samples of ten individuals from three environments, varying in testing distance and obstruction condition. Extensive experimental evaluations demonstrate that the proposed framework can improve the identification accuracy across environments, and surpasses state-of-the-art methods by up to 18.06%.
普遍的基于视觉的身份识别引起的隐私泄露引发了无数的担忧。一种很有前途的保护隐私的方法是识别反映人的无线信号,但是这种方法面临着在多环境下失去有效性的主要挑战。在本文中,我们使用迁移学习来研究基于无线信号的人员识别,以解决跨环境的性能下降问题。我们在数据测量的基础上研究了环境变化引起的特征变化。在特征对齐概念的基础上,提出了一种基于迁移学习的无线身份识别框架。在该框架中,我们整合了一系列信号处理方法,包括信号选择、预处理和增强,其中前者包括一个参考环境来辅助特征提取,后两者分别减少数据噪声和提高数据多样性。我们还提出了一种模型泛化方法,该方法利用神经网络对来自不同环境的特征进行对齐,有利于提取与环境无关的特征,同时结合了人和环境信息。在一个由脉冲无线电超宽带(IR-UWB)雷达组成的真实无线测试平台上,我们建立并公开发布了一个数据集,其中包含来自三种环境的10个人的22264个样本,这些环境在测试距离和障碍物条件上有所不同。广泛的实验评估表明,所提出的框架可以提高跨环境的识别精度,并且超过最先进的方法高达18.06%。
{"title":"P3ID: A Privacy-Preserving Person Identification Framework Towards Multi-Environments Based on Transfer Learning","authors":"Hanxiang He;Xintao Huan;Jing Wang;Yong Luo;Han Hu;Jianping An","doi":"10.1109/TMC.2024.3459944","DOIUrl":"10.1109/TMC.2024.3459944","url":null,"abstract":"Concerns surrounding privacy leakages caused by prevalent vision-based person identifications are countless. A promising privacy-preserving solution is to identify the wireless signals reflecting persons, which, however, faces a major challenge of losing efficacy in multi-environments. In this paper, we work on person identification based on wireless signals using transfer learning, toward tackling the performance deterioration across environments. We investigate the feature variations induced by environmental shifts based on data measurements. Lay our foundation on the feature alignment concept, we propose a novel wireless-based person identification framework using transfer learning. In the framework, we integrate a series of signal processing methods including signal selection, pre-processing, and augmentation, where the first includes a reference environment to assist the feature extraction while the latter two respectively reduce the data noise and improve the data diversity. We also propose a model generalization method where a neural network is employed to align features from different environments, which facilitates the extraction of environment-independent features while incorporating both person and environment information. On a real wireless testbed consisting of an Impulse Radio Ultra-WideBand (IR-UWB) radar, we build and publicly release a dataset with 22,264 samples of ten individuals from three environments, varying in testing distance and obstruction condition. Extensive experimental evaluations demonstrate that the proposed framework can improve the identification accuracy across environments, and surpasses state-of-the-art methods by up to 18.06%.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"102-116"},"PeriodicalIF":7.7,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142269296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Structure of Hypergraphs Arising in Cellular Mobile Communication Systems 蜂窝移动通信系统中出现的超图结构
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-13 DOI: 10.1109/TMC.2024.3460170
Ashwin Ganesan
An assumption that researchers have often used to model interference in a wireless network is the unit disk graph model. While many theoretical results and performance guarantees have been obtained under this model, an open research direction is to extend these results to hypergraph interference models. Motivated by recent results that the worst-case performance of the distributed maximal scheduling algorithm is characterized by the interference degree of the hypergraph, in the present work we investigate properties of the interference degree of the hypergraph and the structure of hypergraphs arising from physical constraints. We show that the problem of computing the interference degree of a hypergraph is NP-hard and we prove some properties and results concerning this hypergraph invariant. We investigate which hypergraphs are realizable, i.e. which hypergraphs arise in practice, based on physical constraints, as the interference model of a wireless network. In particular, a question that arises naturally is: what is the maximal value of $r$ such that the hypergraph $K_{1,r}$ is realizable? We determine this quantity for various integral and nonintegral values of the path loss exponent of signal propagation. We also investigate hypergraphs generated by line networks.
研究人员经常使用单元磁盘图模型来对无线网络中的干扰进行建模。虽然在该模型下已经获得了许多理论结果和性能保证,但将这些结果扩展到超图干涉模型是一个开放的研究方向。由于最近的研究结果表明分布式最大调度算法的最坏情况性能是由超图的干涉度表征的,因此本文研究了超图干涉度的性质以及由物理约束引起的超图结构。我们证明了计算超图干涉度的问题是np困难的,并证明了关于这个超图不变量的一些性质和结果。我们研究了哪些超图是可实现的,即哪些超图在实践中出现,基于物理约束,作为无线网络的干扰模型。特别地,一个自然产生的问题是:$r$的最大值是多少,使得超图$K_{1,r}$是可实现的?我们对信号传播路径损耗指数的各种积分值和非积分值确定了这个量。我们还研究了由线网络生成的超图。
{"title":"The Structure of Hypergraphs Arising in Cellular Mobile Communication Systems","authors":"Ashwin Ganesan","doi":"10.1109/TMC.2024.3460170","DOIUrl":"10.1109/TMC.2024.3460170","url":null,"abstract":"An assumption that researchers have often used to model interference in a wireless network is the unit disk graph model. While many theoretical results and performance guarantees have been obtained under this model, an open research direction is to extend these results to hypergraph interference models. Motivated by recent results that the worst-case performance of the distributed maximal scheduling algorithm is characterized by the interference degree of the hypergraph, in the present work we investigate properties of the interference degree of the hypergraph and the structure of hypergraphs arising from physical constraints. We show that the problem of computing the interference degree of a hypergraph is NP-hard and we prove some properties and results concerning this hypergraph invariant. We investigate which hypergraphs are realizable, i.e. which hypergraphs arise in practice, based on physical constraints, as the interference model of a wireless network. In particular, a question that arises naturally is: what is the maximal value of \u0000<inline-formula><tex-math>$r$</tex-math></inline-formula>\u0000 such that the hypergraph \u0000<inline-formula><tex-math>$K_{1,r}$</tex-math></inline-formula>\u0000 is realizable? We determine this quantity for various integral and nonintegral values of the path loss exponent of signal propagation. We also investigate hypergraphs generated by line networks.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"150-164"},"PeriodicalIF":7.7,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142257218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ambient Light Reflection-Based Eavesdropping Enhanced With cGAN 利用 cGAN 增强基于环境光反射的窃听功能
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-13 DOI: 10.1109/TMC.2024.3460392
Guoming Zhang;Heqiang Fu;Zhijie Xiang;Xinyan Zhou;Pengfei Hu;Xiuzhen Cheng;Yanni Yang
Sound eavesdropping using light has been an area of considerable interest and concern, as it can be achieved over long distances. However, previous work has often lacked stealth (e.g., active emission of laser beams) or been limited in the range of realistic applications (e.g., using direct light from a device’s indicator LED or a hanging light bulb). In this paper, we present EchoLight, a non-intrusive, passive and long-range sound eavesdropping method that utilizes the extensive reflection of ambient light from vibrating objects to reconstruct sound. We analyze the relationship between reflection light signals and sound signals, particularly in situations where the frequency response of reflective objects and the efficiency of diffuse reflection are suboptimal. Based on this analysis, we have introduced an algorithm based on cGAN to address the issues of nonlinear distortion and spectral absence in the frequency domain of sound. We extensively evaluate EchoLight’s performance in a variety of real-world scenarios. It demonstrates the ability to accurately reconstruct audio from a variety of source distances, attack distances, sound levels, light sources, and reflective materials. Our results reveal that the reconstructed audio exhibits a high degree of similarity to the original audio over 40 meters of attack distance.
利用光来窃听声音一直是一个值得关注的领域,因为它可以在很长的距离上实现。然而,以前的工作通常缺乏隐蔽性(例如,激光束的主动发射)或在实际应用范围内受到限制(例如,使用设备指示灯LED或悬挂灯泡的直接光)。在本文中,我们提出了EchoLight,一种非侵入性,被动和远程的声音窃听方法,利用振动物体的环境光的广泛反射来重建声音。我们分析了反射光信号和声音信号之间的关系,特别是在反射物体的频率响应和漫反射效率不理想的情况下。在此基础上,我们提出了一种基于cGAN的算法来解决声音频域的非线性失真和频谱缺失问题。我们广泛评估了EchoLight在各种现实场景中的性能。它展示了从各种源距离、攻击距离、声级、光源和反射材料中准确重建音频的能力。结果表明,在40米的攻击距离内,重建的音频与原始音频具有高度的相似性。
{"title":"Ambient Light Reflection-Based Eavesdropping Enhanced With cGAN","authors":"Guoming Zhang;Heqiang Fu;Zhijie Xiang;Xinyan Zhou;Pengfei Hu;Xiuzhen Cheng;Yanni Yang","doi":"10.1109/TMC.2024.3460392","DOIUrl":"10.1109/TMC.2024.3460392","url":null,"abstract":"Sound eavesdropping using light has been an area of considerable interest and concern, as it can be achieved over long distances. However, previous work has often lacked stealth (e.g., active emission of laser beams) or been limited in the range of realistic applications (e.g., using direct light from a device’s indicator LED or a hanging light bulb). In this paper, we present \u0000<monospace>EchoLight</monospace>\u0000, a non-intrusive, passive and long-range sound eavesdropping method that utilizes the extensive reflection of ambient light from vibrating objects to reconstruct sound. We analyze the relationship between reflection light signals and sound signals, particularly in situations where the frequency response of reflective objects and the efficiency of diffuse reflection are suboptimal. Based on this analysis, we have introduced an algorithm based on cGAN to address the issues of nonlinear distortion and spectral absence in the frequency domain of sound. We extensively evaluate \u0000<monospace>EchoLight</monospace>\u0000’s performance in a variety of real-world scenarios. It demonstrates the ability to accurately reconstruct audio from a variety of source distances, attack distances, sound levels, light sources, and reflective materials. Our results reveal that the reconstructed audio exhibits a high degree of similarity to the original audio over 40 meters of attack distance.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"72-85"},"PeriodicalIF":7.7,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142269379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Age-of-Information Scheduling With NOMA via Deep Reinforcement Learning 通过深度强化学习的分布式信息年龄调度与 NOMA
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1109/TMC.2024.3459101
Congwei Zhang;Yifei Zou;Zuyuan Zhang;Dongxiao Yu;Jorge Torres Gómez;Tian Lan;Falko Dressler;Xiuzhen Cheng
Many emerging applications in edge computing require processing of huge volumes of data generated by end devices, using the freshest available information. In this paper, we address the distributed optimization of multi-user long-term average Age-of-Information (AoI) objectives in edge networks that use NOMA transmission. This poses a challenge of non-convex online optimization, which in existing work often requires either decision making in a combinatorial space or a global view of entire network states. To overcome this challenge, we propose a reinforcement learning-based framework that adopts a novel hierarchical decomposition of decision making. Specifically, we propose three different types of distributed agents to learn with respect to efficiency of AoI scheduling, fairness of AoI scheduling, as well as a high-level policy balancing these potentially conflicting design objectives. Not only does the proposed decomposition improve learning performance due to disentanglement of different design objectives/rewards, but it also enables the algorithm to learn the best policy while also learning the explanations – as actions can be directly compared in terms of the design objectives. Our evaluations show that the proposed algorithm improves the long-term average AoI by $200%{-}300%$ and 400% compared to prior works with NOMA and the optimal solution without NOMA, respectively.
边缘计算中的许多新兴应用需要处理终端设备生成的大量数据,使用最新的可用信息。在本文中,我们解决了使用NOMA传输的边缘网络中多用户长期平均信息年龄(AoI)目标的分布式优化问题。这对非凸在线优化提出了挑战,在现有的工作中,通常需要在组合空间或整个网络状态的全局视图中进行决策。为了克服这一挑战,我们提出了一种基于强化学习的框架,该框架采用了一种新的决策分层分解方法。具体来说,我们提出了三种不同类型的分布式代理来学习AoI调度的效率,AoI调度的公平性,以及平衡这些潜在冲突的设计目标的高级策略。由于不同设计目标/奖励的分离,所提出的分解不仅提高了学习性能,而且还使算法能够在学习解释的同时学习最佳策略——因为可以根据设计目标直接比较行动。我们的评估表明,与使用NOMA和不使用NOMA的最优解相比,该算法的长期平均AoI分别提高了200%{-}300%$和400% $。
{"title":"Distributed Age-of-Information Scheduling With NOMA via Deep Reinforcement Learning","authors":"Congwei Zhang;Yifei Zou;Zuyuan Zhang;Dongxiao Yu;Jorge Torres Gómez;Tian Lan;Falko Dressler;Xiuzhen Cheng","doi":"10.1109/TMC.2024.3459101","DOIUrl":"10.1109/TMC.2024.3459101","url":null,"abstract":"Many emerging applications in edge computing require processing of huge volumes of data generated by end devices, using the freshest available information. In this paper, we address the distributed optimization of multi-user long-term average Age-of-Information (AoI) objectives in edge networks that use NOMA transmission. This poses a challenge of non-convex online optimization, which in existing work often requires either decision making in a combinatorial space or a global view of entire network states. To overcome this challenge, we propose a reinforcement learning-based framework that adopts a novel hierarchical decomposition of decision making. Specifically, we propose three different types of distributed agents to learn with respect to efficiency of AoI scheduling, fairness of AoI scheduling, as well as a high-level policy balancing these potentially conflicting design objectives. Not only does the proposed decomposition improve learning performance due to disentanglement of different design objectives/rewards, but it also enables the algorithm to learn the best policy while also learning the explanations – as actions can be directly compared in terms of the design objectives. Our evaluations show that the proposed algorithm improves the long-term average AoI by \u0000<inline-formula><tex-math>$200%{-}300%$</tex-math></inline-formula>\u0000 and 400% compared to prior works with NOMA and the optimal solution without NOMA, respectively.","PeriodicalId":50389,"journal":{"name":"IEEE Transactions on Mobile Computing","volume":"24 1","pages":"30-44"},"PeriodicalIF":7.7,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142180543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Mobile Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1