首页 > 最新文献

Telecommunication Systems最新文献

英文 中文
Performance analysis of drone assisted cooperation in correlated hybrid channel environment 相关混合信道环境中无人机辅助合作的性能分析
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-03-10 DOI: 10.1007/s11235-024-01116-7
Nikita Goel, Vrinda Gupta

This paper proposes the height-dependent channel correlation coefficient and leverages it to produce a hybrid correlated channel. The efficacy of the drone-assisted cooperation (DAC) system has been assessed using the hybrid correlated channel coefficient, and the findings are contrasted with those obtained using the uncorrelated hybrid channel coefficient. Maximal ratio combining (MRC), a diversity combining technique, is employed at the destination node. Amplify-and-forward (AF) and decode-and-forward (DF) are utilized at the relay node (drone) to assess the overall performance of the DAC system in the proposed scenario. The paper introduces two algorithms designed to calculate the capacity and outage probability for DAC systems within a correlated hybrid channel environment. Finally, the effectiveness of the proposed model has been depicted in the simulation results. The proposal might prove helpful in a dire situation where the base station faces disruptions.

本文提出了与高度相关的信道相关系数,并利用它生成了混合相关信道。使用混合相关信道系数评估了无人机辅助合作(DAC)系统的功效,并将评估结果与使用非相关混合信道系数得出的结果进行了对比。目的节点采用了分集组合技术--最大比率组合(MRC)。在中继节点(无人机)上采用了放大-前向(AF)和解码-前向(DF)技术,以评估拟议方案中 DAC 系统的整体性能。论文介绍了两种算法,旨在计算相关混合信道环境中 DAC 系统的容量和中断概率。最后,仿真结果说明了所提模型的有效性。在基站面临中断的危急情况下,该建议可能会有所帮助。
{"title":"Performance analysis of drone assisted cooperation in correlated hybrid channel environment","authors":"Nikita Goel, Vrinda Gupta","doi":"10.1007/s11235-024-01116-7","DOIUrl":"https://doi.org/10.1007/s11235-024-01116-7","url":null,"abstract":"<p>This paper proposes the height-dependent channel correlation coefficient and leverages it to produce a hybrid correlated channel. The efficacy of the drone-assisted cooperation (DAC) system has been assessed using the hybrid correlated channel coefficient, and the findings are contrasted with those obtained using the uncorrelated hybrid channel coefficient. Maximal ratio combining (MRC), a diversity combining technique, is employed at the destination node. Amplify-and-forward (AF) and decode-and-forward (DF) are utilized at the relay node (drone) to assess the overall performance of the DAC system in the proposed scenario. The paper introduces two algorithms designed to calculate the capacity and outage probability for DAC systems within a correlated hybrid channel environment. Finally, the effectiveness of the proposed model has been depicted in the simulation results. The proposal might prove helpful in a dire situation where the base station faces disruptions.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"2015 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140097841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative H-ARQ employing powerful totally decomposed cumulative Goppa codes 采用强大的完全分解累积 Goppa 码的合作 H-ARQ
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-03-05 DOI: 10.1007/s11235-024-01112-x

Abstract

This paper presents a multi-relay Coded-Cooperative system that integrates Hybrid Automatic Repeat Request and Coded Cooperative Cooperation. It utilizes powerful cyclic Totally Decomposed Cumulative Goppa codes (TDCG codes) known for exceptional performance as best-known linear codes. The destination code is jointly designed by combining TDCG codes from relay and source codes. Optimized relay channel codes improve overall system bit-error-rate performance, aided by a proposed optimization technique. Numerical simulations assess BER performance under various channel conditions with BPSK modulation and coherence detection over flat Rayleigh fading channels. Results show that the TDCG coded-cooperative scheme outperforms non-cooperative approaches and similar coded cooperation techniques with comparable code rates. The integration of HARQ and Coded Cooperative Cooperation enhances wireless communication system reliability and efficiency.

摘要 本文介绍了一种多中继编码合作系统,该系统集成了混合自动重复请求和编码合作。该系统采用了功能强大的循环完全分解累积 Goppa 码(TDCG 码),其性能与最著名的线性码一样出众。目的码是结合中继码和源码的 TDCG 码共同设计的。优化后的中继信道编码可提高整个系统的误码率性能,这得益于所提出的优化技术。数值模拟评估了各种信道条件下的误码率性能,包括 BPSK 调制和相干检测,以及平坦的瑞利衰减信道。结果表明,TDCG 编码合作方案的性能优于非合作方法和具有可比编码率的类似编码合作技术。HARQ 与编码合作的集成提高了无线通信系统的可靠性和效率。
{"title":"Cooperative H-ARQ employing powerful totally decomposed cumulative Goppa codes","authors":"","doi":"10.1007/s11235-024-01112-x","DOIUrl":"https://doi.org/10.1007/s11235-024-01112-x","url":null,"abstract":"<h3>Abstract</h3> <p>This paper presents a multi-relay Coded-Cooperative system that integrates Hybrid Automatic Repeat Request and Coded Cooperative Cooperation. It utilizes powerful cyclic Totally Decomposed Cumulative Goppa codes (TDCG codes) known for exceptional performance as best-known linear codes. The destination code is jointly designed by combining TDCG codes from relay and source codes. Optimized relay channel codes improve overall system bit-error-rate performance, aided by a proposed optimization technique. Numerical simulations assess BER performance under various channel conditions with BPSK modulation and coherence detection over flat Rayleigh fading channels. Results show that the TDCG coded-cooperative scheme outperforms non-cooperative approaches and similar coded cooperation techniques with comparable code rates. The integration of HARQ and Coded Cooperative Cooperation enhances wireless communication system reliability and efficiency. </p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"39 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140032666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel compressed linear network coding vectors for multihop communication networks 用于多跳通信网络的新型压缩线性网络编码向量
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-03-04 DOI: 10.1007/s11235-024-01110-z
Anas A. Abudaqa, Ashraf S. H. Mahmoud, Alawi A. ALsaggaf, Tarek R. Sheltami

Random Linear Network Coding (RLNC) is well-known to provide high throughput and low latency for vast communication networks. However, RLNC often suffers from high coefficients overhead, specifically, when it’s applied to limited resource or short-packet networks. Herein, the problem of RLNC coefficients vector overhead is revisited. A novel framework, based on modular arithmetic and prime numbers, and influenced by the Chinese remainder theorem (CRT), is proposed to reduce the coefficients overhead by augmenting only a tiny one item coefficient instead of the entire coefficients vector. The proposed method successfully addresses all the shortcomings of previous methods, including restrictions on generation size and packet density, recoding on intermediate nodes, and creating innovative coding vectors. Theoretical analysis and experimental demonstrate the superior performance of the proposed scheme in terms of coefficients overhead ratio, download time, throughput, and packet drop rate. This evaluation has considered two types of networks: wireless sensors network for Internet of things, and conventional wireline Ethernet.

众所周知,随机线性网络编码(RLNC)可为庞大的通信网络提供高吞吐量和低延迟。然而,RLNC 常常受到高系数开销的困扰,特别是当它应用于资源有限或短数据包网络时。本文重新探讨了 RLNC 的系数向量开销问题。基于模块化算术和素数,并受中国余数定理(CRT)的影响,提出了一种新颖的框架,通过只增加很小的一项系数而不是整个系数向量来减少系数开销。所提出的方法成功地解决了以往方法的所有缺点,包括对生成大小和数据包密度的限制、中间节点的重新编码以及创建创新的编码向量。理论分析和实验证明了所提方案在系数开销比、下载时间、吞吐量和数据包丢包率方面的优越性能。该评估考虑了两种类型的网络:物联网无线传感器网络和传统有线以太网。
{"title":"Novel compressed linear network coding vectors for multihop communication networks","authors":"Anas A. Abudaqa, Ashraf S. H. Mahmoud, Alawi A. ALsaggaf, Tarek R. Sheltami","doi":"10.1007/s11235-024-01110-z","DOIUrl":"https://doi.org/10.1007/s11235-024-01110-z","url":null,"abstract":"<p>Random Linear Network Coding (RLNC) is well-known to provide high throughput and low latency for vast communication networks. However, RLNC often suffers from high coefficients overhead, specifically, when it’s applied to limited resource or short-packet networks. Herein, the problem of RLNC coefficients vector overhead is revisited. A novel framework, based on modular arithmetic and prime numbers, and influenced by the Chinese remainder theorem (CRT), is proposed to reduce the coefficients overhead by augmenting only a tiny one item coefficient instead of the entire coefficients vector. The proposed method successfully addresses all the shortcomings of previous methods, including restrictions on generation size and packet density, recoding on intermediate nodes, and creating innovative coding vectors. Theoretical analysis and experimental demonstrate the superior performance of the proposed scheme in terms of coefficients overhead ratio, download time, throughput, and packet drop rate. This evaluation has considered two types of networks: wireless sensors network for Internet of things, and conventional wireline Ethernet.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"3 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140026286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of atmospheric turbulence on OOK and BPSK modulations for satcom optical uplink 大气湍流对卫星通信光上行链路 OOK 和 BPSK 调制的影响
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-03-04 DOI: 10.1007/s11235-024-01103-y
I. Medina, J. J. Hernández-Gómez, C. Couder-Castañeda

The constant growth in the demand for communication services has implied an increase the transmitted data rate and bandwidth. Optical satellite communications have provided a solution to this problem, allowing to increase exponentially the transfer rate between the ground station and an in-orbit satellite. However, although this technology offers numerous advantages, such as higher bandwidth, lower power consumption, narrower beam width, as well as greater simplicity of development, when the transmitted light signal passes through the atmosphere it experiences attenuation and fluctuations due to atmospheric turbulence. In this work, optical power fluctuations are modelled by means of a Gamma-Gamma optical turbulence model, so strong turbulence conditions are established according to Rytov’s turbulence theory, considering a measure of the intensity of the optical turbulence when extended to strong fluctuation conditions, depending on the zenith angle variations from 0(^circ ) to 60(^circ ). Finally, the performance evaluation of BPSK and OOK modulation schemes for conditions with variations of pointing angle, based on atmospheric attenuation, signal scattering and absorption is given. The results show better performance of the modulation schemes at low zenith pointing angles and wavelengths of 1550 nm, over 850 nm and 1064 nm. Moreover, BPSK modulation shows to be able to provide lower bit error (BER) values for a given signal-to-noise ratio, outperforming OOK modulation scheme in this sense.

通信服务需求的不断增长意味着传输数据速率和带宽的增加。光学卫星通信为这一问题提供了解决方案,使地面站与在轨卫星之间的传输速率成倍增长。然而,尽管这项技术具有带宽高、功耗低、波束宽度窄、开发更简单等诸多优点,但当传输的光信号穿过大气层时,会因大气湍流而产生衰减和波动。在这项工作中,光功率波动是通过伽马-伽马光学湍流模型来建模的,因此根据雷托夫湍流理论建立了强湍流条件,考虑了扩展到强波动条件时光学湍流强度的度量,这取决于从 0(^circ) 到 60(^circ) 的天顶角变化。最后,根据大气衰减、信号散射和吸收,给出了 BPSK 和 OOK 调制方案在指向角变化条件下的性能评估。结果表明,在低天顶指向角和 1550 nm 波长条件下,调制方案的性能优于 850 nm 和 1064 nm。此外,BPSK 调制还能在给定信噪比的情况下提供较低的误码率 (BER),在这方面优于 OOK 调制方案。
{"title":"Impact of atmospheric turbulence on OOK and BPSK modulations for satcom optical uplink","authors":"I. Medina, J. J. Hernández-Gómez, C. Couder-Castañeda","doi":"10.1007/s11235-024-01103-y","DOIUrl":"https://doi.org/10.1007/s11235-024-01103-y","url":null,"abstract":"<p>The constant growth in the demand for communication services has implied an increase the transmitted data rate and bandwidth. Optical satellite communications have provided a solution to this problem, allowing to increase exponentially the transfer rate between the ground station and an in-orbit satellite. However, although this technology offers numerous advantages, such as higher bandwidth, lower power consumption, narrower beam width, as well as greater simplicity of development, when the transmitted light signal passes through the atmosphere it experiences attenuation and fluctuations due to atmospheric turbulence. In this work, optical power fluctuations are modelled by means of a Gamma-Gamma optical turbulence model, so strong turbulence conditions are established according to Rytov’s turbulence theory, considering a measure of the intensity of the optical turbulence when extended to strong fluctuation conditions, depending on the zenith angle variations from 0<span>(^circ )</span> to 60<span>(^circ )</span>. Finally, the performance evaluation of BPSK and OOK modulation schemes for conditions with variations of pointing angle, based on atmospheric attenuation, signal scattering and absorption is given. The results show better performance of the modulation schemes at low zenith pointing angles and wavelengths of 1550 nm, over 850 nm and 1064 nm. Moreover, BPSK modulation shows to be able to provide lower bit error (BER) values for a given signal-to-noise ratio, outperforming OOK modulation scheme in this sense.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"30 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140026172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coverage analysis and deployment design of RIS-assisted systems RIS 辅助系统的覆盖面分析和部署设计
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-03-01 DOI: 10.1007/s11235-024-01107-8
Ying Wang, Angran Liu, Yiyang Ni, Jie Zhao

Reconfigurable intelligent surface (RIS) is a novel technology that can help enhance the wireless propagation environment by altering the electromagnetic properties of its massive low-cost passive reflecting elements. This paper aims to explore the mechanism of how the deployment of RIS influences cell coverage from the system level and to obtain valuable guidance for actual RIS deployment design. We derive the coverage area gain (CAG) brought by deploying RIS to the whole system and analyze how the deployment parameters influence performance. The results reveal that it is more favorable to deploy the RIS close to the base station (BS) to gain more long-range coverage, and the coverage area gain can keep approximately constant as long as the ratio of the RIS element number to the deployment distance (between the BS and the RIS) remains unchanged. The scaling law between the CAG and the ratio is obtained. Furthermore, we extend the analysis to the scenario with two RISs deployed and respectively derive the coverage area gains brought by the two RISs when they are symmetrically and vertically deployed. We find that the aforementioned ratio rule still holds here, and the vertical deployment can achieve higher CAG than the symmetric deployment.

可重构智能表面(RIS)是一种新型技术,可通过改变其大量低成本无源反射元件的电磁特性来改善无线传播环境。本文旨在从系统层面探讨可重构智能表面的部署如何影响小区覆盖的机制,并为实际的可重构智能表面部署设计提供有价值的指导。我们推导了部署 RIS 为整个系统带来的覆盖区域增益 (CAG),并分析了部署参数对性能的影响。结果表明,将 RIS 部署在靠近基站(BS)的位置更有利于获得更多的远距离覆盖,而且只要 RIS 元素数量与部署距离(BS 与 RIS 之间)之比保持不变,覆盖区域增益就能保持近似恒定。由此可以得出 CAG 与比率之间的比例规律。此外,我们还将分析扩展到部署了两个 RIS 的情况,并分别得出了对称部署和垂直部署两个 RIS 所带来的覆盖面积增益。我们发现,上述比率规则在这里仍然成立,垂直部署比对称部署能获得更高的 CAG。
{"title":"Coverage analysis and deployment design of RIS-assisted systems","authors":"Ying Wang, Angran Liu, Yiyang Ni, Jie Zhao","doi":"10.1007/s11235-024-01107-8","DOIUrl":"https://doi.org/10.1007/s11235-024-01107-8","url":null,"abstract":"<p>Reconfigurable intelligent surface (RIS) is a novel technology that can help enhance the wireless propagation environment by altering the electromagnetic properties of its massive low-cost passive reflecting elements. This paper aims to explore the mechanism of how the deployment of RIS influences cell coverage from the system level and to obtain valuable guidance for actual RIS deployment design. We derive the coverage area gain (CAG) brought by deploying RIS to the whole system and analyze how the deployment parameters influence performance. The results reveal that it is more favorable to deploy the RIS close to the base station (BS) to gain more long-range coverage, and the coverage area gain can keep approximately constant as long as the ratio of the RIS element number to the deployment distance (between the BS and the RIS) remains unchanged. The scaling law between the CAG and the ratio is obtained. Furthermore, we extend the analysis to the scenario with two RISs deployed and respectively derive the coverage area gains brought by the two RISs when they are symmetrically and vertically deployed. We find that the aforementioned ratio rule still holds here, and the vertical deployment can achieve higher CAG than the symmetric deployment.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"1 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140003266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical behavioral characteristics of network communication delay in IPv4/IPv6 Internet IPv4/IPv6 互联网中网络通信延迟的统计行为特征
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-28 DOI: 10.1007/s11235-024-01111-y

Abstract

Studies on the delay characteristics under the Internet macro-topology provides a reference for resolving the real-time performance issue of the data transmission of Internet devices. With the overall advancement of IPv6 Internet deployment, the changes in network structure and paths will generate different degrees of delay. In this context, a comparative analysis of the behavioral characteristics of IPv4 and IPv6 network delay was performed in this study. We selected the sampled data of valid paths located at four monitors on different continents under the CAIDA_Ark project to obtain statistics for the network delay and communication diameter on the IPv4 and IPv6 Internet and found that their correlation was extremely weak. Furthermore, the communication diameter on IPv6 Internet was slightly shorter than that on IPv4 Internet. The network delay exhibited a bimodal or multimodal heavy-tailed distribution. The network delay and maximum link delay for IPv4 and IPv6 Internet were strongly correlated, indicating that the bottleneck delay affects the relationship between the network delay and communication diameter. Next, we analyzed the relationship between network delay and bottleneck delay for IPv4 and IPv6 Internet and found that bottleneck delay has a more significant impact on the network delay on the valid paths for IPv4 Internet than for IPv6 Internet. After mapping the IP addresses at both ends of the bottleneck delay to the Autonomous Systems (ASes), we found that the bottleneck delay on the valid paths for the IPv4 Internet was mostly distributed in the intra-AS, whereas it was in the inter-AS for the IPv6 Internet. Finally, we analyzed the factors affecting bottleneck delay and found that propagation delay in the long-distance range is an important factor (L > 4000 km on IPv4 Internet and L > 7000 km on IPv6 Internet). In addition, for IPv4 Internet, queuing delay is an important factor affecting bottleneck delay, whereas in the process of data communication on the IPv6 Internet, the impact of propagation and queuing delays on the bottleneck delay is weakened.

摘要 对互联网宏观拓扑结构下的时延特性进行研究,为解决互联网设备数据传输的实时性问题提供了参考。随着互联网 IPv6 部署的全面推进,网络结构和路径的变化会产生不同程度的时延。在此背景下,本研究对 IPv4 和 IPv6 网络延迟的行为特征进行了对比分析。我们选取了 CAIDA_Ark 项目中位于不同大洲的四个监测点的有效路径的抽样数据,对 IPv4 和 IPv6 互联网的网络延迟和通信直径进行了统计,发现它们之间的相关性极弱。此外,IPv6 互联网的通信直径略短于 IPv4 互联网。网络延迟呈现双峰或多峰重尾分布。IPv4 和 IPv6 互联网的网络延迟和最大链路延迟密切相关,这表明瓶颈延迟会影响网络延迟和通信直径之间的关系。接下来,我们分析了 IPv4 和 IPv6 互联网的网络延迟与瓶颈延迟之间的关系,发现在 IPv4 互联网的有效路径上,瓶颈延迟对网络延迟的影响比 IPv6 互联网更为显著。将瓶颈延迟两端的 IP 地址映射到自治系统(ASes)后,我们发现 IPv4 互联网有效路径上的瓶颈延迟主要分布在自治系统内,而 IPv6 互联网的瓶颈延迟则分布在自治系统间。最后,我们分析了影响瓶颈延迟的因素,发现长距离范围内的传播延迟是一个重要因素(IPv4 互联网为 4000 千米,IPv6 互联网为 7000 千米)。此外,在 IPv4 互联网中,队列延迟是影响瓶颈延迟的重要因素,而在 IPv6 互联网的数据通信过程中,传播延迟和队列延迟对瓶颈延迟的影响有所减弱。
{"title":"Statistical behavioral characteristics of network communication delay in IPv4/IPv6 Internet","authors":"","doi":"10.1007/s11235-024-01111-y","DOIUrl":"https://doi.org/10.1007/s11235-024-01111-y","url":null,"abstract":"<h3>Abstract</h3> <p>Studies on the delay characteristics under the Internet macro-topology provides a reference for resolving the real-time performance issue of the data transmission of Internet devices. With the overall advancement of IPv6 Internet deployment, the changes in network structure and paths will generate different degrees of delay. In this context, a comparative analysis of the behavioral characteristics of IPv4 and IPv6 network delay was performed in this study. We selected the sampled data of valid paths located at four monitors on different continents under the CAIDA_Ark project to obtain statistics for the network delay and communication diameter on the IPv4 and IPv6 Internet and found that their correlation was extremely weak. Furthermore, the communication diameter on IPv6 Internet was slightly shorter than that on IPv4 Internet. The network delay exhibited a bimodal or multimodal heavy-tailed distribution. The network delay and maximum link delay for IPv4 and IPv6 Internet were strongly correlated, indicating that the bottleneck delay affects the relationship between the network delay and communication diameter. Next, we analyzed the relationship between network delay and bottleneck delay for IPv4 and IPv6 Internet and found that bottleneck delay has a more significant impact on the network delay on the valid paths for IPv4 Internet than for IPv6 Internet. After mapping the IP addresses at both ends of the bottleneck delay to the Autonomous Systems (ASes), we found that the bottleneck delay on the valid paths for the IPv4 Internet was mostly distributed in the intra-AS, whereas it was in the inter-AS for the IPv6 Internet. Finally, we analyzed the factors affecting bottleneck delay and found that propagation delay in the long-distance range is an important factor (<em>L</em> &gt; 4000 km on IPv4 Internet and <em>L</em> &gt; 7000 km on IPv6 Internet). In addition, for IPv4 Internet, queuing delay is an important factor affecting bottleneck delay, whereas in the process of data communication on the IPv6 Internet, the impact of propagation and queuing delays on the bottleneck delay is weakened.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"78 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140003133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a crop pest control system based on the Internet of Things and fuzzy logic 基于物联网和模糊逻辑的作物害虫控制系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-26 DOI: 10.1007/s11235-024-01106-9
Xuhui Wang, Vahid Jannesari

Smart agriculture is an emerging concept that helps modern farm management using technologies such as the Internet of Things (IoT), robotics, drones, and artificial intelligence, so that this leads to an increase in the quantity and quality of farm products and optimization of human resources. Efforts have been made in the past to control pests and plant diseases, and this has led to an increase in agricultural products. Control and prevention of crop diseases is the least expensive method of pest control, which also has good results in reducing insect pests. This study develops a crop pest control system based on IoT technology, which includes two parts: (1) hardware as a plant protection machine, and (2) software as an information management system. Here, light trap technology and ozone sterilization are incorporated in the proposed system to control insect pests and diseases of agricultural crops. The information management system consists of IoT technology and a mobile app, which provides remote control capability. In this system, several IoT-based sensor devices are responsible for collecting environmental information in real time. The basic routing protocol for the system implementation is Open Shortest Path First . We present a fuzzy logic-based method for energy-aware routing. We proved the effectiveness of the proposed system through implementation on a greenhouse facility.

智能农业是一个新兴概念,它利用物联网(IoT)、机器人、无人机和人工智能等技术帮助现代农业管理,从而提高农产品的数量和质量,优化人力资源。过去,人们一直在努力控制虫害和植物病害,这导致了农产品的增加。控制和预防作物病害是成本最低的病虫害防治方法,在减少虫害方面也有很好的效果。本研究开发了一种基于物联网技术的农作物病虫害防治系统,包括两部分:(1)作为植保机的硬件;(2)作为信息管理系统的软件。其中,光诱捕技术和臭氧杀菌技术被纳入到所提出的系统中,用于控制农作物的病虫害。信息管理系统由物联网技术和手机应用程序组成,提供远程控制能力。在该系统中,多个基于物联网的传感器设备负责实时收集环境信息。系统实施的基本路由协议是开放式最短路径优先协议。我们提出了一种基于模糊逻辑的能量感知路由方法。通过在温室设施上的实施,我们证明了所提系统的有效性。
{"title":"Towards a crop pest control system based on the Internet of Things and fuzzy logic","authors":"Xuhui Wang, Vahid Jannesari","doi":"10.1007/s11235-024-01106-9","DOIUrl":"https://doi.org/10.1007/s11235-024-01106-9","url":null,"abstract":"<p>Smart agriculture is an emerging concept that helps modern farm management using technologies such as the Internet of Things (IoT), robotics, drones, and artificial intelligence, so that this leads to an increase in the quantity and quality of farm products and optimization of human resources. Efforts have been made in the past to control pests and plant diseases, and this has led to an increase in agricultural products. Control and prevention of crop diseases is the least expensive method of pest control, which also has good results in reducing insect pests. This study develops a crop pest control system based on IoT technology, which includes two parts: (1) hardware as a plant protection machine, and (2) software as an information management system. Here, light trap technology and ozone sterilization are incorporated in the proposed system to control insect pests and diseases of agricultural crops. The information management system consists of IoT technology and a mobile app, which provides remote control capability. In this system, several IoT-based sensor devices are responsible for collecting environmental information in real time. The basic routing protocol for the system implementation is Open Shortest Path First . We present a fuzzy logic-based method for energy-aware routing. We proved the effectiveness of the proposed system through implementation on a greenhouse facility.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"2015 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139978020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectrum sharing for LTE and 5G-NR coexistence 实现 LTE 和 5G-NR 共存的频谱共享
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-25 DOI: 10.1007/s11235-024-01113-w

Abstract

Spectrum sharing provides a rapid migration pathway toward 5G by enabling the coexistence of 4G LTE and 5G new radio (NR) that share the same spectrum. Due to significant differences in the LTE and 5G-NR air interfaces, several enablers are required to facilitate the spectrum sharing. In this study, we explore the coexistence features and investigate their impacts on network performance. For static and dynamic spectrum sharing scenarios, we assess the impacts of different spectrum sharing ratios, user ratios, MIMO configurations, mixed numerology profiles and traffic patterns on the user throughput and network capacities of spectrum sharing networks, compared with the LTE only and 5G-NR only networks with exclusive spectrum access. The key results show that spectrum sharing leads to a marginal capacity gain over LTE only network and achieves considerably lower capacity than the 5G-NR only network. Also, the results show that mixed numerology profiles between the LTE and 5G-NR lead to capacity losses due to inter-numerology interference. In addition, user and spectrum sharing ratios between LTE and 5G-NR have critical impacts on performance. Reduced spectrum per device as the number of 5G devices increases, higher signaling overhead and higher scheduling complexity are other limiting factors for spectrum sharing networks. The results show limited capacity benefits and reinforce spectrum sharing between LTE and 5G-NR as mainly an evolutionary path to accommodate 5G users in the same LTE spectrum while migrating to the fully-fledged 5G networks. For significant capacity increase, other features such as carrier aggregation, overlay of small cells and higher order MIMO would need to be incorporated into the network.

摘要 频谱共享通过实现共享相同频谱的 4G LTE 和 5G 新无线电(NR)的共存,提供了向 5G 快速迁移的途径。由于 LTE 和 5G-NR 的空中接口存在显著差异,因此需要若干促进因素来推动频谱共享。在本研究中,我们探讨了共存特性,并研究了它们对网络性能的影响。针对静态和动态频谱共享场景,我们评估了不同的频谱共享比例、用户比例、MIMO 配置、混合数字配置文件和流量模式对频谱共享网络的用户吞吐量和网络容量的影响,并与仅有 LTE 和仅有 5G-NR 的独占频谱接入网络进行了比较。主要结果表明,频谱共享比仅有 LTE 的网络仅带来微不足道的容量增益,而比仅有 5G-NR 的网络实现的容量要低得多。结果还显示,LTE 和 5G-NR 之间的混合数字配置文件会因数字间干扰而导致容量损失。此外,LTE 和 5G-NR 之间的用户和频谱共享率对性能也有重要影响。频谱共享网络的其他限制因素包括:随着 5G 设备数量的增加,每台设备的频谱减少;信令开销增加;调度复杂度增加。研究结果表明,LTE 和 5G-NR 之间的频谱共享在容量上的优势有限,而且主要是在向成熟的 5G 网络迁移的同时,在相同的 LTE 频谱上容纳 5G 用户的一种演进途径。要大幅提高容量,还需要在网络中加入载波聚合、小蜂窝叠加和高阶多输入多输出等其他功能。
{"title":"Spectrum sharing for LTE and 5G-NR coexistence","authors":"","doi":"10.1007/s11235-024-01113-w","DOIUrl":"https://doi.org/10.1007/s11235-024-01113-w","url":null,"abstract":"<h3>Abstract</h3> <p>Spectrum sharing provides a rapid migration pathway toward 5G by enabling the coexistence of 4G LTE and 5G new radio (NR) that share the same spectrum. Due to significant differences in the LTE and 5G-NR air interfaces, several enablers are required to facilitate the spectrum sharing. In this study, we explore the coexistence features and investigate their impacts on network performance. For static and dynamic spectrum sharing scenarios, we assess the impacts of different spectrum sharing ratios, user ratios, MIMO configurations, mixed numerology profiles and traffic patterns on the user throughput and network capacities of spectrum sharing networks, compared with the LTE only and 5G-NR only networks with exclusive spectrum access. The key results show that spectrum sharing leads to a marginal capacity gain over LTE only network and achieves considerably lower capacity than the 5G-NR only network. Also, the results show that mixed numerology profiles between the LTE and 5G-NR lead to capacity losses due to inter-numerology interference. In addition, user and spectrum sharing ratios between LTE and 5G-NR have critical impacts on performance. Reduced spectrum per device as the number of 5G devices increases, higher signaling overhead and higher scheduling complexity are other limiting factors for spectrum sharing networks. The results show limited capacity benefits and reinforce spectrum sharing between LTE and 5G-NR as mainly an evolutionary path to accommodate 5G users in the same LTE spectrum while migrating to the fully-fledged 5G networks. For significant capacity increase, other features such as carrier aggregation, overlay of small cells and higher order MIMO would need to be incorporated into the network.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"10 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139946157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BO-LCNN: butterfly optimization based lightweight convolutional neural network for remote data integrity auditing and data sanitizing model BO-LCNN:基于蝴蝶优化的轻量级卷积神经网络,用于远程数据完整性审计和数据清除模型
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-19 DOI: 10.1007/s11235-023-01096-0
B. Judy Flavia, Balika J. Chelliah

With the increasing use of cloud storage for sensitive and personal information, ensuring data security has become a top priority. It is important to prevent sensitive data from being identified by unauthorized users during the distribution of cloud files. The main aim is to transmit the data in a secured manner without encrypting the entire file. Hence a novel design for remote data integrity auditing and data sanitizing that enables users to access files without revealing sensitive information. Our approach includes identity-based shared data integrity auditing, which is performed using different zero-knowledge proof protocols such as ZK-SNARK and ZK-STARK. We also propose a pinhole-imaging-based learning butterfly optimization algorithm with a lightweight convolutional neural network (PILBOA-LCNN) technique for data sanitization and security. The LCNN is used to identify sensitive terms in the document and safeguard them to maintain confidentiality. In the proposed PILBOA-LCNN technique, key extraction is a critical task during data restoration and sanitization. The PILBOA algorithm is used for key optimization during data sanitization. We evaluate the performance of our proposed model in terms of privacy preservation and document sanitization using the UPC and bus user datasets. The experimentation results revealed that the proposed method enhanced recall, F-measure, and precision scores as 90%, 89%, and 92%. It also has a low computation time of 109.2 s and 113.5 s. Our experimental results demonstrate that our proposed model outperforms existing techniques and offers improved cloud data storage privacy and accessibility.

随着敏感信息和个人信息越来越多地使用云存储,确保数据安全已成为重中之重。在分发云文件时,必须防止敏感数据被未经授权的用户识别。其主要目的是在不加密整个文件的情况下以安全的方式传输数据。因此,我们设计了一种新颖的远程数据完整性审计和数据消毒方法,使用户能够在不泄露敏感信息的情况下访问文件。我们的方法包括基于身份的共享数据完整性审计,该审计使用不同的零知识证明协议(如 ZK-SNARK 和 ZK-STARK)执行。我们还提出了一种基于针孔成像的学习蝴蝶优化算法和轻量级卷积神经网络(PILBOA-LCNN)技术,用于数据清除和安全。LCNN 用于识别文档中的敏感词汇,并保护它们以保持机密性。在拟议的 PILBOA-LCNN 技术中,密钥提取是数据恢复和净化过程中的一项关键任务。PILBOA 算法用于数据清理过程中的密钥优化。我们使用 UPC 和公交用户数据集评估了我们提出的模型在隐私保护和文档净化方面的性能。实验结果表明,所提方法的召回率、F-measure 和精确度分别提高了 90%、89% 和 92%。计算时间也较短,分别为 109.2 秒和 113.5 秒。实验结果表明,我们提出的模型优于现有技术,并改善了云数据存储的隐私性和可访问性。
{"title":"BO-LCNN: butterfly optimization based lightweight convolutional neural network for remote data integrity auditing and data sanitizing model","authors":"B. Judy Flavia, Balika J. Chelliah","doi":"10.1007/s11235-023-01096-0","DOIUrl":"https://doi.org/10.1007/s11235-023-01096-0","url":null,"abstract":"<p>With the increasing use of cloud storage for sensitive and personal information, ensuring data security has become a top priority. It is important to prevent sensitive data from being identified by unauthorized users during the distribution of cloud files. The main aim is to transmit the data in a secured manner without encrypting the entire file. Hence a novel design for remote data integrity auditing and data sanitizing that enables users to access files without revealing sensitive information. Our approach includes identity-based shared data integrity auditing, which is performed using different zero-knowledge proof protocols such as ZK-SNARK and ZK-STARK. We also propose a pinhole-imaging-based learning butterfly optimization algorithm with a lightweight convolutional neural network (PILBOA-LCNN) technique for data sanitization and security. The LCNN is used to identify sensitive terms in the document and safeguard them to maintain confidentiality. In the proposed PILBOA-LCNN technique, key extraction is a critical task during data restoration and sanitization. The PILBOA algorithm is used for key optimization during data sanitization. We evaluate the performance of our proposed model in terms of privacy preservation and document sanitization using the UPC and bus user datasets. The experimentation results revealed that the proposed method enhanced recall, F-measure, and precision scores as 90%, 89%, and 92%. It also has a low computation time of 109.2 s and 113.5 s. Our experimental results demonstrate that our proposed model outperforms existing techniques and offers improved cloud data storage privacy and accessibility.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"39 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139910611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks 使用智能攻击图模型检测和缓解物联网网络中的攻击,以便取证
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-15 DOI: 10.1007/s11235-024-01105-w
Sonam Bhardwaj, Mayank Dave

This article focuses on the urgent cybersecurity concerns in the Internet of Things (IoT) environment, highlighting the crucial importance of protecting these networks in the face of increasing amounts of IoT data. The paper explores the intricacies of deploying security mechanisms for Internet of Things (IoT) devices, specifically those that are restricted by limited resources. This study examines the inherent weaknesses in IoT systems and analyses the strategies used by malicious individuals to gain control and privileges. In order to tackle these difficulties, the study suggests a sophisticated security system that combines artificial intelligence and an intelligent attack graph. An outstanding characteristic of the model incorporates a method devised to restrain virus spread and accelerate network restoration by introducing virtual nodes. The research showcases the results of the vulnerable attack path predictor (VAPP) module of the proposed model, emphasising its exceptional accuracy in distinguishing between black (0) and red (1) attack paths compared to alternative Machine Learning techniques. Moreover, a thorough evaluation of the module's performance is carried out, with a specific emphasis on security concerns and predictive capacities. Proverif is utilised to validate the security settings and evaluate the resilience of the secret keys. The findings demonstrate a detection rate of 98.48% and an authentication rate of 85%, outperforming the achievements of earlier studies. The contributions greatly enhance the ability of IoT networks to withstand challenges, and the use of cryptographic verification confirms its dependability in the ever-changing digital environment.

本文重点关注物联网(IoT)环境中紧迫的网络安全问题,强调在物联网数据量不断增加的情况下保护这些网络的极端重要性。本文探讨了为物联网(IoT)设备部署安全机制的复杂性,特别是那些受限于有限资源的设备。本研究探讨了物联网系统的固有弱点,并分析了恶意人员为获得控制权和权限而采取的策略。为了解决这些难题,本研究提出了一种结合人工智能和智能攻击图的复杂安全系统。该模型的一个突出特点是采用了一种通过引入虚拟节点来抑制病毒传播和加速网络恢复的方法。研究展示了所提模型的易受攻击路径预测器(VAPP)模块的成果,强调与其他机器学习技术相比,该模块在区分黑色(0)和红色(1)攻击路径方面具有极高的准确性。此外,还对该模块的性能进行了全面评估,特别强调了安全问题和预测能力。利用 Proverif 验证了安全设置并评估了秘钥的弹性。研究结果表明,检测率为 98.48%,验证率为 85%,超过了早期研究的成果。这些贡献大大增强了物联网网络抵御挑战的能力,而加密验证的使用则证实了其在不断变化的数字环境中的可靠性。
{"title":"Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks","authors":"Sonam Bhardwaj, Mayank Dave","doi":"10.1007/s11235-024-01105-w","DOIUrl":"https://doi.org/10.1007/s11235-024-01105-w","url":null,"abstract":"<p>This article focuses on the urgent cybersecurity concerns in the Internet of Things (IoT) environment, highlighting the crucial importance of protecting these networks in the face of increasing amounts of IoT data. The paper explores the intricacies of deploying security mechanisms for Internet of Things (IoT) devices, specifically those that are restricted by limited resources. This study examines the inherent weaknesses in IoT systems and analyses the strategies used by malicious individuals to gain control and privileges. In order to tackle these difficulties, the study suggests a sophisticated security system that combines artificial intelligence and an intelligent attack graph. An outstanding characteristic of the model incorporates a method devised to restrain virus spread and accelerate network restoration by introducing virtual nodes. The research showcases the results of the vulnerable attack path predictor (VAPP) module of the proposed model, emphasising its exceptional accuracy in distinguishing between black (0) and red (1) attack paths compared to alternative Machine Learning techniques. Moreover, a thorough evaluation of the module's performance is carried out, with a specific emphasis on security concerns and predictive capacities. Proverif is utilised to validate the security settings and evaluate the resilience of the secret keys. The findings demonstrate a detection rate of 98.48% and an authentication rate of 85%, outperforming the achievements of earlier studies. The contributions greatly enhance the ability of IoT networks to withstand challenges, and the use of cryptographic verification confirms its dependability in the ever-changing digital environment.</p>","PeriodicalId":51194,"journal":{"name":"Telecommunication Systems","volume":"35 1","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139768448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Telecommunication Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1